Results 221 to 230 of about 116,208 (285)
A cooperative ECC-based authentication protocol for VANETs. [PDF]
Liu Z, Yao N, Bai S, Mai T.
europepmc +1 more source
A hybrid deep learning model for detection and mitigation of DDoS attacks in VANETs. [PDF]
Jayakrishna N, Prasanth NN.
europepmc +1 more source
A multidimensional, efficient, and secure data query based on privacy preservation in vehicular ad hoc networks. [PDF]
Zhao X, Dong G.
europepmc +1 more source
Improving Vehicular Network Authentication with Teegraph: A Hashgraph-Based Efficiency Approach. [PDF]
Cádiz RJ, Nicolas-Sans R, Tamámes JF.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Vehicular Ad-Hoc Network: An Overview
2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS), 2019Vehicular Ad-hoc Networks (VANETs) helps in making smart vehicles by establishing communication network between vehicles or vehicle and Road Side Units (RSUs) enhancing road safety by improving traffic flow resulting in significant reduction of car accidents.
Sakshi Sharma, null Nidhi
openaire +2 more sources
IEEE Internet of Things Journal, 2022
Vehicular ad-hoc network enhances driving safety and enables various intelligent transportation applications by adopting the revolutionary vehicular wireless communication technology. This has attracted a lot of attentions from both academia and industry
Yuhan Yang +4 more
semanticscholar +1 more source
Vehicular ad-hoc network enhances driving safety and enables various intelligent transportation applications by adopting the revolutionary vehicular wireless communication technology. This has attracted a lot of attentions from both academia and industry
Yuhan Yang +4 more
semanticscholar +1 more source
Securing vehicular ad hoc networks [PDF]
Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture.
Raya, Maxim, Hubaux, Jean-Pierre
openaire +2 more sources

