V. Nguyen
YOU?
Author Swipe
View article: Secure UAV-assisted Mobile Edge Computing for IoT with Backscatter Communication in the Presence of a Moving Eavesdropper
Secure UAV-assisted Mobile Edge Computing for IoT with Backscatter Communication in the Presence of a Moving Eavesdropper Open
The perception layer security (PLS) is crucial for ensuring that the data collected by Internet of Things (IoT) devices is accurate, reliable, and protected against various security threats. It helps maintain the overall integrity of the I…
View article: Application of Optimization Algorithms in Reliable Pathfinding Models for Smart Cities
Application of Optimization Algorithms in Reliable Pathfinding Models for Smart Cities Open
This article implements and compares two potential algorithms in urban traffic management: the RAO-3 optimization algorithm and the Q-Learning reinforcement learning algorithm. The research is conducted on the dynamic traffic density optim…
View article: Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher
Demonstration of Grover’s algorithm for retrieving secret keys in a basic SPN block cipher Open
In this study, we present in detail the application of Grover's quantum algorithm to the searching problem of the secret key of a simple SPN (Substitution–permutation network) block cipher called Yo-yo. The main goal of the paper is to cla…