Results 61 to 70 of about 138 (95)

Network Performance Improvements for Low-Latency Anonymity Networks [PDF]

open access: yes, 2013
While advances to the Internet have enabled users to easily interact and exchange information online, they have also created several opportunities for adversaries to prey on users’ private information.
Al-Sabah, Mashael
core  

An innovative reputation system for trustworthy and secure vehicle-to-vehicle communication [PDF]

open access: yes
Vehicular Ad Hoc Networks (VANETs) are a promising technology that ensures secure and efficient transportation by allowing vehicles to seamlessly communicate with each other and with infrastructure to share real-time information and make better decisions
Almani, Dimah
core   +2 more sources

CryptoQuest : Adapting Modern Cryptographic Schemes for Resource-Constrained Devices [PDF]

open access: yes
Even though the idea of transforming basic objects into smart objects with sensors is not new, it is only now that we have started seeing the incredible impact of this digital transformation in our societies. There is no doubt that the Internet of Things
Frimpong, Eugene Kwaku
core  

OASIS: An organizational certificateLess aggregate signature scheme in distributed networks for IoT [PDF]

open access: yes
International audienceIn recent years, a large number of CertificateLess Aggregate Signature (CLAS) schemes have been proposed to overcome both the complexity of Public Key Infrastructure (PKI) certificate management and the key escrow problem.
Gritti, Clémentine
core   +1 more source

Smart Flood Detection with AI and Blockchain Integration in Saudi Arabia Using Drones. [PDF]

open access: yesSensors (Basel), 2023
Alsumayt A   +4 more
europepmc   +1 more source

Formalizing, Analyzing and Improving Aerospace Security Protocols [PDF]

open access: yes
Secure networking protocols for domains such as the internet and the internet-of-things are regularly scrutinized and discussed by the research community.
Wimalasiri, Bhagya
core  

Tracking beam and location in wireless networks [PDF]

open access: yes
To meet the stringent requirements in manufacturing, the fifth generation (5G) is integrated with the production process since it supports massive machine type communication (mMTC), ultra-reliable low-latency communications (URLLC), and enhanced mobile ...
Wang, Rui
core  

Home - About - Disclaimer - Privacy