Results 61 to 70 of about 8,202 (205)

A literature review on V2X communications security: Foundation, solutions, status, and future

open access: yesIET Communications, Volume 18, Issue 20, Page 1683-1715, December 2024.
The article first introduces the development history of the past Internet of Vehicles(IoV), summarizes some common V2X security threats, describes the development and application of the SM commercial algorithm in recent years, and finally, statistics and introduces the part of the development process of the security protocols currently used in IoV ...
Zuobin Ying   +3 more
wiley   +1 more source

A Reconfigurable Tile-Based Architecture to Compute FFT and FIR Functions in the Context of Software-Defined Radio [PDF]

open access: yes, 2005
Software-defined radio (SDR) is the term used for flexible radio systems that can deal with multiple standards. For an efficient implementation, such systems require appropriate reconfigurable architectures.
Gerez, Sabih H.   +3 more
core   +2 more sources

A secure authentication protocol for IP-based wireless sensor communications using the location/ID split protocol (LISP) [PDF]

open access: yes, 2014
The future of the Internet of Things (IoT) involves a huge number of node devices such as wireless sensors that can communicate in a machine-to-machine pattern, where devices will be globally addressed and identified.
Lasebae, Aboubaker   +2 more
core   +1 more source

Experiencia de colaboración entre Comunicación Social e Ingeniería Informática para la realización de videos educativos

open access: yesAnagramas Rumbos y Sentidos de la Comunicación, 2019
El estudio que propició este proyecto consistió en un análisis comparativo entre lenguajes visuales y lenguajes textuales. En este caso específico se emplearon el cálculo textual PiCO (creado el 1996 por el grupo Avispa de las universidades del Valle y ...
Carlos Andrés Tavera Romero   +2 more
doaj   +1 more source

Un nuevo jénero de Avispas Cavadoras

open access: yesBoletín Museo Nacional de Historia Natural, 1919
El jénero Lautara tiene su posición en el sistema entre los jéneros Solierella Spin. y Plenoculus Fox. Estatura pequeña, 4-8 mm Colores del cuerpo de la única especie conocida son negro i colorado, sin pintas amarillas o blancas. Pronoto, tubérculos humerales, posescudo i tibias revestidos de pubescencia densa, sedosa, plateada.
openaire   +1 more source

Early Alarm on the First Occurrence of the Southern Giant Hornet Vespa soror du Buysson, 1905 (Vespidae) in Europe

open access: yesEcology and Evolution, Volume 14, Issue 11, November 2024.
First occurrence of the Asian southern giant hornet Vespa soror in Europe. We present a detailed description, combining morphological and molecular traits, as well as key information about its identification and current distribution. We discuss the most plausible pathways and vectors of introduction, its potential invasiveness, and subsequent impacts ...
Omar Sánchez   +4 more
wiley   +1 more source

Preliminary study of the problems associated to the invasion of the yellow-legged hornet ("Vespa velutina" Lepeletier, 1836) in Galicia (Spain) [PDF]

open access: yes, 2016
[Resumen] En el año 2004 se obtuvo el primer registro de avispa asiática (Vespa velutina Lepeletier, 1836) en Europa, concretamente en Francia, teniéndose constancia de su presencia en Galicia desde el año 2013.
Outón Cacheiro, Leticia
core  

Expressive Policy-Based Access Control for Resource-Constrained Devices [PDF]

open access: yes, 2018
Upcoming smart scenarios enabled by the Internet of Things envision smart objects that expose services that can adapt to user behavior or be managed with the goal of achieving higher productivity, often in multi-stakeholder applications.
Astorga Burgo, Jasone   +4 more
core   +2 more sources

Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 6, November/December 2024.
Abstract Vehicular ad‐hoc networks (VANETs) support features like comfort, safety, and infotainment, enhancing traffic efficiency. However, traditional VANETs struggle with dynamic and large‐scale networks due to fixed policies and complex architectures, such as constantly changing vehicle positions.
Adi El‐Dalahmeh   +3 more
wiley   +1 more source

A Security Formal Verification Method for Protocols Using Cryptographic Contactless Smart Cards [PDF]

open access: yes, 2016
We present a method of contactless smart card protocol modeling suitable for finding vulnerabilities using model checking. Smart cards are used in applications that require high level of security, such as payment applications, therefore it should be ...
Hanacek, P., Henzl, M.
core   +2 more sources

Home - About - Disclaimer - Privacy