Ara
Toplam kayıt 50, listelenen: 11-20
A Lightweight Authentication Scheme for 6G-IoT Enabled Maritime Transport System
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2023)
The Sixth-Generation (6G) mobile network has the
potential to provide not only traditional communication services
but also additional processing, caching, sensing, and control capabilities to a massive number of Internet ...
Optimizing Service Stipulation Uncertainty with Deep Reinforcement Learning for Internet Vehicle Systems
(TECH SCIENCE PRESS, 871 CORONADO CENTER DR, SUTE 200, HENDERSON, NV 89052, 2023)
Fog computing brings computational services near the network
edge to meet the latency constraints of cyber-physical System (CPS) applications. Edge devices enable limited computational capacity and energy availability ...
PASKE-IoD: Privacy-Protecting Authenticated Key Establishment for Internet of Drones
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021)
Unmanned aerial vehicles/drones are considered an essential ingredient of traffic motoring
systems in smart cities. Interconnected drones, also called the Internet of Drones (IoD), gather critical data
from the environmental ...
ARAP-SG: Anonymous and Reliable Authentication Protocol for Smart Grids
(IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 445 HOES LANE, PISCATAWAY, NJ 08855-4141, 2021)
Internet of Things-enabled smart grid (SG) technology provides ample advantages to traditional
power grids. In an SG system, the smart meter (SM) is the critical component that collects the power
usage information related ...
A secure and lightweight authentication scheme for next generation IoT infrastructure
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)
While the 6G/IoT transition is on the cards, the real advantage of this transition can be realized only if the user
privacy and security are guaranteed. The smartcard and password based authentication protocols can help ...
A clogging resistant secure authentication scheme for fog computing services
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)
Fog computing (FC) is an infrastructure consisting of decentralized computing, where computing resources such
as storage, applications, and data are scattered among the cloud and data source. Fog computing inherits ...
Correcting "PALK: Password-based anonymous lightweight key agreement framework for smart grid"
(ELSEVIER SCI LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, OXON, ENGLAND, 2021)
Very recently in 2020, Khan et al. proposed an authentication scheme (PALK) for the smart grid infrastructure.
Based on elliptic curve cryptography (ECC), symmetric hash functions and block cipher based encryption/
decryption ...
GCACS-IoD: A certificate based generic access control scheme for Internet of drones
(ELSEVIER, RADARWEG 29, 1043 NX AMSTERDAM, NETHERLANDS, 2021)
Internet of drones (IoD) has gained significant importance in recent times due to its applications in several
critical domains ranging from commercial to defense and rescue operations. With several drones flying in
different ...
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021)
The heterogeneous resource-required application tasks increase the cloud service provider (CSP) energy cost and revenue by providing demand resources. Enhancing CSP profit and preserving energy cost is a challenging task. ...
Designing an Efficient and Secure Message Exchange Protocol for Internet of Vehicles
(WILEY-HINDAWI, ADAM HOUSE, 3RD FL, 1 FITZROY SQ, LONDON WIT 5HE, ENGLAND, 2021)
In the advancements in computation and communication technologies and increasing number of vehicles, the concept of Internet of Vehicles (IoV) has emerged as an integral part of daily life, and it can be used to acquire ...