بحث بسيط
السجلات المعروضة 1 -- 10 من 51
G-RAT | A novel graphical randomized authentication technique for consumer smart devices
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
User authentication is the process that is exercised millions of times around the globe by using different techniques and methods. The most prominent way of authentication is alphanumerical password forms that have been ...
How to govern the non-cooperative amateur drones?
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, amateur UAVs have become more and more popular. This is due to the decreasing cost and growing range of applications such as weather monitoring, cargo transport and recreational purposes. However, ...
Cross Layer NOMA Interference Mitigation for Femtocell Users in 5G Environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In this paper, we propose a joint channel allocation and power control algorithm by using cognitive radio non-orthogonal multiple access (CR-NOMA) for femtocell users (FUs). The aim is to maximize the sum rate of the FUs ...
A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Underwater acoustic sensor networks (UASNs) have been widely applied in underwater scenarios where numerous anchoring or floating sensor nodes collaborate in performing some specific assignments, such as information ...
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In recent years, malware with strong concealment uses encrypted protocol to evade detection. Thus, encrypted traffic identification can help security analysts to be more effective in narrowing down those encrypted network ...
Secure UAV communication networks over 5G
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Wireless communications can leverage UAVs to provide ubiquitous connectivity to different device types. Recently, integrating UAVs into a macro cell network is drawing unprecedented interest for supplementing terrestrial ...
Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
With the vast increase in data transmission due to a large number of information collected by devices, data management, and security has been a challenge for organizations. Many data owners (DOs) outsource their data to ...
3D Beamforming with Massive Cylindrical Arrays for Physical Layer Secure Data Transmission
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
In this letter, a novel approach for physical layer security is implemented using massive cylindrical antenna arrays. A part of the arrays is used for transmitting a signal reliably from source to destination using highly ...
Using Bloom Filter to Generate a Physiological Signal-Based Key for Wireless Body Area Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Wireless body area networks (WBANs) are often used to provide communication services for the data from the body. Since the data in WBANs are always closely related to individuals, they need to be kept secret with integrity. ...
LAMANCO: A lightweight anonymous mutual authentication scheme for n -times computing offloading in IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Nowadays in many application scenarios of Internet of Things (IoT), low latency is achieved at the cost of computing-complexity which is beyond the capabilities of IoT devices. Offloading the computing intensive tasks to ...