Quantum computing in power systems

Y Zhou, Z Tang, N Nikmehr, P Babahajiani, F Feng… - IEnergy, 2022 - ieeexplore.ieee.org
Electric power systems provide the backbone of modern industrial societies. Enabling
scalable grid analytics is the keystone to successfully operating large transmission and …

Quantum-secure microgrid

Z Tang, Y Qin, Z Jiang, WO Krawec… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Existing microgrid communication relies on classical public key systems, which are
vulnerable to attacks from quantum computers. This paper uses quantum key distribution …

A tree structure-based improved blockchain framework for a secure online bidding system

A Sarfaraz, RK Chakrabortty, DL Essam - Computers & Security, 2021 - Elsevier
The BlockChain (BC) is considered as one of the most exciting developments in information
and communication technology in the past decade and is widely known as a crypto intensive …

Quantum Security for Microgrids

Z Tang, P Zhang - Microgrids: Theory and Practice, 2024 - Wiley Online Library
Communication has always played a vital role in microgrids in maintaining reliable
operations and achieving great benefits and will be even more critical with the increasing …

Honeypots in digital economy: an analysis of intrusion detection and prevention

MS Rana, MA Shah - 2021 - IET
Today, many organisations are moving their subscriptions to the cloud because the number
of clients is increasing day by day. To provide better services to users with less cost, cloud …

Cloud Services Protection and Identification of Low Rate DDOS Attacks Based on Soft Computation

Y Patel, SR Anwar - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
The primary benefit of the fog system is its immediate scalability in providing the work in
accordance with the different requirements. Anyone from anywhere can access cloud …

[HTML][HTML] Quantum Computing Cryptography and Lattice Mechanism

AMA Al-muqarm, F Abedi, AS Abosinnee - 2022 - jicce.org
Classical cryptography with complex computations has recently been utilized in the latest
computing systems to create secret keys. However, systems can be breached by fast …