بحث بسيط
السجلات المعروضة 11 -- 20 من 26
A Secured Proxy-Based Data Sharing Module in IoT Environments Using Blockchain
(
NLM (Medline)
, 2019 , Article)
Access and utilization of data are central to the cloud computing paradigm. With the advent of the Internet of Things (IoT), the tendency of data sharing on the cloud has seen enormous growth. With data sharing comes ...
A privacy-preserving traffic monitoring scheme via vehicular crowdsourcing
(
MDPI AG
, 2019 , Article)
The explosive number of vehicles has given rise to a series of traffic problems, such as traffic congestion, road safety, and fuel waste. Collecting vehicles’ speed information is an effective way to monitor the traffic ...
Security and privacy preservation in fog-based crowd sensing on the internet of vehicles
(
Academic Press
, 2019 , Article)
The emergence of fog computing enables fog-based vehicle crowd sensing (FBVC) to be utilized in various fields. However, existing privacy issues represent a primary challenge that limits the degree of participation by ...
Multi-modal data semantic localization with relationship dependencies for efficient signal processing in EH CRNs
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Due to spectrum scarcity and energy consumption caused by processing and transmitting multimodal data signals in cognitive radio networks (CRNs), locating key information in the signal for further energy management in EH ...
A secure and efficient renewable energy trading scheme based on blockchain in smart grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Nowadays, with the diversification and decentralization of energy systems, the energy Internet makes it possible to interconnect distributed energy sources and consumers. In the energy trading market, the traditional ...
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, malware with strong concealment uses encrypted protocol to evade detection. Thus, encrypted traffic identification can help security analysts to be more effective in narrowing down those encrypted network ...
Deep neural network-aided Gaussian message passing detection for ultra-reliable low-latency communications
(
Elsevier B.V.
, 2019 , Article)
Ultra-reliable low-latency communications (URLLC) is a key technology in 5G supporting real-time multimedia services, which requires a low-cost signal recovery technology in the physical layer. A kind of well-known ...
An Optimal Channel Occupation Time Adjustment Method for LBE in Unlicensed Spectrum
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Load Based Equipment (LBE) mechanism is a category of Listen-Before-Talk (LBT) protocol adopted by LTE to access unlicensed channels to realize fair coexistence between LTE and Wi-Fi networks. However, most LBE optimization ...
Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Wireless body area networks (WBANs) are often used to provide communication services for the data from the body. Since the data in WBANs are always closely related to individuals, they need to be kept secret with integrity. ...
LAMANCO: A lightweight anonymous mutual authentication scheme for n -times computing offloading in IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Nowadays in many application scenarios of Internet of Things (IoT), low latency is achieved at the cost of computing-complexity which is beyond the capabilities of IoT devices. Offloading the computing intensive tasks to ...