Results 21 to 30 of about 1,839,877 (306)

Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges

open access: yesIEEE Access, 2020
Internet of Vehicles (IoV) is treated as an extension of Vehicle-to-Vehicle (V2V) communication network. IoV helps in enhancing driving aids with the help of vehicle Artificial Intelligence (AI) awareness of other vehicles and their actions.
Palak Bagga   +4 more
doaj   +1 more source

Blockchain-Based Data Access Control and Key Agreement System in IoT Environment

open access: yesSensors, 2023
Recently, with the increasing application of the Internet of Things (IoT), various IoT environments such as smart factories, smart homes, and smart grids are being generated.
JoonYoung Lee   +6 more
doaj   +1 more source

Secure Signature-Based Authenticated Key Establishment Scheme for Future IoT Applications

open access: yesIEEE Access, 2017
Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus allowing a direct integration of computing systems with the ...
Sravani Challa   +6 more
doaj   +1 more source

Algorithmic Statistics [PDF]

open access: yes, 2001
While Kolmogorov complexity is the accepted absolute measure of information content of an individual finite object, a similarly absolute notion is needed for the relation between an individual data sample and an individual model summarizing the ...
Gacs, Peter, Tromp, John, Vitanyi, Paul
core   +3 more sources

Algorithmic Information Distortions in Node-Aligned and Node-Unaligned Multidimensional Networks

open access: yesEntropy, 2021
In this article, we investigate limitations of importing methods based on algorithmic information theory from monoplex networks into multidimensional networks (such as multilayer networks) that have a large number of extra dimensions (i.e., aspects).
Felipe S. Abrahão   +3 more
semanticscholar   +1 more source

On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks

open access: yesIEEE Access, 2021
A secure authentication protocol plays a crucial role in securing communications over wireless and mobile networks. Due to resource-limitations and the nature of the wireless channel, the global mobile networks are highly susceptible to various attacks ...
R. Shashidhara   +3 more
doaj   +1 more source

Understanding how replication processes can maintain systems away from equilibrium using Algorithmic Information Theory

open access: yesBiosyst., 2016
Replication can be envisaged as a computational process that is able to generate and maintain order far-from-equilibrium. Replication processes, can self-regulate, as the drive to replicate can counter degradation processes that impact on a system.
S. Devine
semanticscholar   +1 more source

Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment

open access: yesIEEE Access, 2019
For secure communication between any two neighboring sensing devices on the Internet of Things (IoT) environment, it is essential to design a secure device access control and key agreement protocol, in which the two phases, namely, “node ...
Ashok Kumar Das   +4 more
doaj   +1 more source

Correlations in Quantum Network Topologies Created with Cloning

open access: yesMathematics, 2023
With progress in quantum technologies, the field of quantum networks has emerged as an important area of research. In the last few years, there has been substantial progress in understanding the correlations present in quantum networks.
Manish Kumar Shukla   +3 more
doaj   +1 more source

A statistical mechanical interpretation of algorithmic information theory III: Composite systems and fixed points [PDF]

open access: yes2009 IEEE Information Theory Workshop, 2009
The statistical mechanical interpretation of algorithmic information theory (AIT, for short) was introduced and developed by our former works [K. Tadaki, Local Proceedings of CiE 2008, pp. 425–434, 2008] and [K. Tadaki, Proceedings of LFCS'09, Springer's
K. Tadaki
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy