A literature review on V2X communications security: Foundation, solutions, status, and future
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying +3 more
wiley +1 more source
A Reconfigurable Tile-Based Architecture to Compute FFT and FIR Functions in the Context of Software-Defined Radio [PDF]
Software-defined radio (SDR) is the term used for flexible radio systems that can deal with multiple standards. For an efficient implementation, such systems require appropriate reconfigurable architectures.
Gerez, Sabih H. +3 more
core +2 more sources
A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP) [PDF]
The future of the Internet of Things (IoT) involves a huge number of node devices such as wireless sensors that can communicate in a machine-to-machine pattern, where devices will be globally addressed and identified.
Lasebae, Aboubaker +2 more
core +1 more source
El estudio que propició este proyecto consistió en un análisis comparativo entre lenguajes visuales y lenguajes textuales. En este caso específico se emplearon el cálculo textual PiCO (creado el 1996 por el grupo Avispa de las universidades del Valle y ...
Carlos Andrés Tavera Romero +2 more
doaj +1 more source
Un nuevo jénero de Avispas Cavadoras
El jénero Lautara tiene su posición en el sistema entre los jéneros Solierella Spin. y Plenoculus Fox. Estatura pequeña, 4-8 mm Colores del cuerpo de la única especie conocida son negro i colorado, sin pintas amarillas o blancas. Pronoto, tubérculos humerales, posescudo i tibias revestidos de pubescencia densa, sedosa, plateada.
openaire +1 more source
First occurrence of the Asian southern giant hornet Vespa soror in Europe. We present a detailed description, combining morphological and molecular traits, as well as key information about its identification and current distribution. We discuss the most plausible pathways and vectors of introduction, its potential invasiveness, and subsequent impacts ...
Omar Sánchez +4 more
wiley +1 more source
Preliminary study of the problems associated to the invasion of the yellow-legged hornet ("Vespa velutina" Lepeletier, 1836) in Galicia (Spain) [PDF]
[Resumen] En el año 2004 se obtuvo el primer registro de avispa asiática (Vespa velutina Lepeletier, 1836) en Europa, concretamente en Francia, teniéndose constancia de su presencia en Galicia desde el año 2013.
Outón Cacheiro, Leticia
core
Expressive Policy-Based Access Control for Resource-Constrained Devices [PDF]
Upcoming smart scenarios enabled by the Internet of Things envision smart objects that expose services that can adapt to user behavior or be managed with the goal of achieving higher productivity, often in multi-stakeholder applications.
Astorga Burgo, Jasone +4 more
core +2 more sources
Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis
Abstract Vehicular ad‐hoc networks (VANETs) support features like comfort, safety, and infotainment, enhancing traffic efficiency. However, traditional VANETs struggle with dynamic and large‐scale networks due to fixed policies and complex architectures, such as constantly changing vehicle positions.
Adi El‐Dalahmeh +3 more
wiley +1 more source
A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards [PDF]
We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities using model checking. Smart cards are used in applications that require high level of security, such as payment applications, therefore it should be ...
Hanacek, P., Henzl, M.
core +2 more sources

