Increasing the attractiveness of electric vehicles for consumers in cold climates
S Shvetsova - E3S Web of Conferences, 2024 - e3s-conferences.org
This article examines the factors that constrain the spread of electric vehicles in cold regions.
An analysis of the main reasons restraining the spread of electric vehicles in cold regions is …
An analysis of the main reasons restraining the spread of electric vehicles in cold regions is …
Multi-path routing algorithm based on deep reinforcement learning for SDN
Y Zhang, L Qiu, Y Xu, X Wang, S Wang, A Paul, Z Wu - Applied Sciences, 2023 - mdpi.com
Software-Defined Networking (SDN) enhances network control but faces Distributed Denial
of Service (DDoS) attacks due to centralized control and flow-table constraints in network …
of Service (DDoS) attacks due to centralized control and flow-table constraints in network …
Certificateless Aggregate Signatures: A Comprehensive Survey and Comparative Analysis
This paper presents a comprehensive survey of the certificateless aggregate signature
scheme in terms of their computational performance and security. This signature scheme is …
scheme in terms of their computational performance and security. This signature scheme is …
A Bilinear Mapping Based Ring Signature Scheme with Batch Verification for Applications in VANETs
L Negi, D Kumar - Wireless Personal Communications, 2024 - Springer
Nowadays, the traditional transportation systems are being replaced by the Vehicular Ad-
hoc Networks (VANETs) based intelligent transportation system. In VANETs, vehicles …
hoc Networks (VANETs) based intelligent transportation system. In VANETs, vehicles …
[HTML][HTML] Strong non-repudiation certificateless scheme with an aggregate signature in vehicular ad-hoc network
A Imghoure, A El-Yahyaoui, F Omary - Franklin Open, 2024 - Elsevier
Abstract In Vehicular Ad-Hoc Networks (VANETs), a Certificateless Aggregate Signature
(CLAS) scheme with a conditional anonymity authentication meets both anonymity and …
(CLAS) scheme with a conditional anonymity authentication meets both anonymity and …
Utilizing Certificateless Cryptography for IoT Device Identity Authentication Protocols in Web3
Traditional methods of identity authentication often rely on centralized architectures, which
poses risks of computational overload and single points of failure. We propose a protocol …
poses risks of computational overload and single points of failure. We propose a protocol …