Results 21 to 30 of about 1,839,877 (306)
Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges
Internet of Vehicles (IoV) is treated as an extension of Vehicle-to-Vehicle (V2V) communication network. IoV helps in enhancing driving aids with the help of vehicle Artificial Intelligence (AI) awareness of other vehicles and their actions.
Palak Bagga +4 more
doaj +1 more source
Blockchain-Based Data Access Control and Key Agreement System in IoT Environment
Recently, with the increasing application of the Internet of Things (IoT), various IoT environments such as smart factories, smart homes, and smart grids are being generated.
JoonYoung Lee +6 more
doaj +1 more source
Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the ...
Sravani Challa +6 more
doaj +1 more source
While Kolmogorov complexity is the accepted absolute measure of information content of an individual finite object, a similarly absolute notion is needed for the relation between an individual data sample and an individual model summarizing the ...
Gacs, Peter, Tromp, John, Vitanyi, Paul
core +3 more sources
Algorithmic Information Distortions in Node-Aligned and Node-Unaligned Multidimensional Networks
In this article, we investigate limitations of importing methods based on algorithmic information theory from monoplex networks into multidimensional networks (such as multilayer networks) that have a large number of extra dimensions (i.e., aspects).
Felipe S. Abrahão +3 more
semanticscholar +1 more source
A secure authentication protocol plays a crucial role in securing communications over wireless and mobile networks. Due to resource-limitations and the nature of the wireless channel, the global mobile networks are highly susceptible to various attacks ...
R. Shashidhara +3 more
doaj +1 more source
Replication can be envisaged as a computational process that is able to generate and maintain order far-from-equilibrium. Replication processes, can self-regulate, as the drive to replicate can counter degradation processes that impact on a system.
S. Devine
semanticscholar +1 more source
Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment
For secure communication between any two neighboring sensing devices on the Internet of Things (IoT) environment, it is essential to design a secure device access control and key agreement protocol, in which the two phases, namely, “node ...
Ashok Kumar Das +4 more
doaj +1 more source
Correlations in Quantum Network Topologies Created with Cloning
With progress in quantum technologies, the field of quantum networks has emerged as an important area of research. In the last few years, there has been substantial progress in understanding the correlations present in quantum networks.
Manish Kumar Shukla +3 more
doaj +1 more source
A statistical mechanical interpretation of algorithmic information theory III: Composite systems and fixed points [PDF]
The statistical mechanical interpretation of algorithmic information theory (AIT, for short) was introduced and developed by our former works [K. Tadaki, Local Proceedings of CiE 2008, pp. 425–434, 2008] and [K. Tadaki, Proceedings of LFCS'09, Springer's
K. Tadaki
semanticscholar +1 more source

