过去一年中添加的文章,按日期排序
Trust management in the internet of vehicles: a systematic literature review of blockchain integration
S Abbasi, N Khaledian, AM Rahmani - … Journal of Information Security, 2024 - Springer
7 天前 - … Existing solutions, often dependent on specific environments and protocols, struggle
to address these issues … of blockchain technology to address these challenges. We argue …
to address these issues … of blockchain technology to address these challenges. We argue …
Efficient Secure Inference Scheme in Multiparty Settings for Industrial Internet of Things
J Lin, Y Miao, L Wei, T Leng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
12 天前 - … To solve the above two issues, we propose a multiparty secure inference scheme
… Technical Overview To achieve efficiency and security, we use two new protocols in …
… Technical Overview To achieve efficiency and security, we use two new protocols in …
[PDF][PDF] Towards Scalable Architectures in oneM2M-based Interoperability deployments in Smart Cities
VJS Pranavasri - 2024 - web2py.iiit.ac.in
14 天前 - … security within real-world smart city deployments. This contribution is pivotal for the
IoT field, challenging the status quo of existing … and technological advancements continue to …
IoT field, challenging the status quo of existing … and technological advancements continue to …
Security and privacy in IoT-based Smart Farming: a review
IA Ali, WA Bukhari, M Adnan, MI Kashif… - Multimedia Tools and …, 2024 - Springer
17 天前 - … protocol and encryption features that it will support. This can then always be updated
by new technological advancements or altered security … of security issues and challenges …
by new technological advancements or altered security … of security issues and challenges …
An optimized secure cluster-based routing protocol for IoT-based WSN structures in smart agriculture with blockchain-based integrity checking
AK Rao, KK Nagwanshi, MK Shukla - Peer-to-Peer Networking and …, 2024 - Springer
21 天前 - … that enhances the efficiency, security, and resilience of … evolving landscape of
agricultural technology, fostering … challenges of energy efficiency, scalability, and security in …
agricultural technology, fostering … challenges of energy efficiency, scalability, and security in …
Pseudonym Revocation System for Iot-Based Medical Applications
N Bermad - Available at SSRN 4865840 - papers.ssrn.com
23 天前 - … security and privacy issues are paramount concerns in the realm of medical IoT
technology… For the continuity of this work, we aim to extend our privacy protocol by incorporating …
technology… For the continuity of this work, we aim to extend our privacy protocol by incorporating …
Secure MANET routing with blockchain-enhanced latent encoder coupled GANs and BEPO optimization
32 天前 - … technology where each node functions as a source, destination, or intermediary
router. However, existing techniques fail to adequately address security … these challenges, this …
router. However, existing techniques fail to adequately address security … these challenges, this …
AI-based anomaly identification techniques for vehicles communication protocol systems: Comprehensive investigation, research opportunities and challenges
37 天前 - … as a communication technology is becoming more … strategy against vehicle data
security breach by the hackers. … AIS in conventional information technology systems (ITSs) is …
security breach by the hackers. … AIS in conventional information technology systems (ITSs) is …
Secure-key management protocols for wireless sensor networks in Internet of Things
K Srinivas, K Sagar - AIP Conference Proceedings, 2024 - pubs.aip.org
37 天前 - … asymmetric key technology on sensor systems. The majority of the difficult challenge
here … which provides IoT services with security protocols. In this way, a user may utilise the …
here … which provides IoT services with security protocols. In this way, a user may utilise the …
A Novel Approach of Lora-Wan Based Robot for Detecting and Killing Weeds
A Atri, H Atri - Available at SSRN 4853424 - papers.ssrn.com
38 天前 - … security have become crucial requirements for human society. Artificial intelligence
technology … areas without access to the internet or telecommunications is challenging. A cost-…
technology … areas without access to the internet or telecommunications is challenging. A cost-…