Results 241 to 250 of about 3,084,416 (309)
A PUF-Based Secure Authentication and Key Agreement Scheme for the Internet of Drones. [PDF]
Choi J, Son S, Kwon D, Park Y.
europepmc +1 more source
Use of Remote Assessment Tools to Substitute Routine Outpatient Care: Scoping Review.
Barclay J+5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Network Design, Modelling and Performance Evaluation, 2018
In this chapter, the author will first present in Section 3.1 an overview of IP addresses with various types and addressing mechanisms. The first version of IP addresses, namely, IP version 4 (IPv4) will be discussed in Section 3.2 followed by various mechanisms for dividing the network with subnetting in Sections 3.3 and 3.4 as well as how to group ...
Quoc-Tuan Vien
openaire +3 more sources
In this chapter, the author will first present in Section 3.1 an overview of IP addresses with various types and addressing mechanisms. The first version of IP addresses, namely, IP version 4 (IPv4) will be discussed in Section 3.2 followed by various mechanisms for dividing the network with subnetting in Sections 3.3 and 3.4 as well as how to group ...
Quoc-Tuan Vien
openaire +3 more sources
RAMP-IoD: A Robust Authenticated Key Management Protocol for the Internet of Drones
IEEE Internet of Things Journal, 2022Internet of Drones (IoD) is the interconnection of unmanned aerial vehicles or drones deployed for collecting sensitive data to be used in critical applications. The drones transmit the collected data to the control room (CR) for analysis, while CR sends
Muhammad Tanveer+3 more
semanticscholar +1 more source