Vol. 13 No. 3 (2025)

Published: 2025-09-11


Articles

Post-Quantum Threats To Ssh Protocol: A Public Key Sharing Perspective

The security of traditional cryptographic schemes is based on mathematical puzzles that cannot be cracked by current computers. However, the rapid development of quantum computers has the potential to greatly reduce the time and resources required to crack these encryption schemes. Although true

Youssef Ahmed El-Mokhtar

1-11

Improving Iiot Router Resilience Through Diversity-Oriented Reliability Methods

The architecture of the Industrial Internet of Things (IIoT) system assumes the presence of a router as the main subsystem, which will allow connecting the subsystems into a single network and connecting them to the equipment of the Internet service provider. Failure of the router can lead to

Andrii Mykolaiovych Hrytsenko

12-26

Simulating Electromagnetic Radiation-Induced Heating In A Female Human Body Model Across Multiple Frequencies





The purpose of research is to develop a computer simulation based mobile phone safety testing scheme that is well suited for testing any mobile phone antenna at different communication frequencies and various realistic scenarios. It has been shown how feasible the

Nino Davitovna Beridze

27-40