Search
Now showing items 11-20 of 26
A Reinforcement Learning Method for Joint Mode Selection and Power Adaptation in the V2V Communication Network in 5G
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
A 5G network is the key driving factor in the development of vehicle-to-vehicle (V2V) communication technology, and V2V communication in 5G has recently attracted great interest. In the V2V communication network, users can ...
Key-policy attribute-based encryption with keyword search in virtualized environments
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable computing resources. It is challenging to search data encrypted and stored in cloud storage servers. Searchable ...
IntegrityChain: Provable data possession for decentralized storage
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data ...
Accountable credential management system for vehicular communication
(
Elsevier Inc.
, 2020 , Article)
Social Internet of Vehicles (SIoV) is becoming a reality where private and secure communication is a prerequisite. Various standardization organizations and studies have reached a consensus to use Vehicular Public-key ...
Zero-Chain: A Blockchain-Based Identity for Digital City Operating System
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The challenges of population management as urban density increase globally have compelled researchers and developers to consider more efficient means of managing resources in cities. Consequently, the smart city concept ...
Blockchain-Enhanced High-Confidence Energy Sharing in Internet of Electric Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
To introduce the opportunities brought by plug-in hybrid electric vehicles (PHEVs) to the energy Internet, we propose a local vehicle-to-vehicle (V2V) energy trading architecture based on fog computing in social hotspots ...
FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In recent years, the Internet of vehicles (IoV) has become an indispensable part of wireless communication. To protect users' privacy and communication security, an increasing number of scholars have focused on studying ...
Artificial Intelligence Security in 5G Networks: Adversarial Examples for Estimating a Travel Time Task
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
With the rapid development of the Internet, the nextgeneration network (5G) has emerged. 5G can support a variety of new applications, such as the Internet of Things (IoT), virtual reality (VR), and the Internet of Vehicles. ...
An adaptive cache management approach in ICN with pre-filter queues
(
Elsevier B.V.
, 2020 , Article)
In Information-Centric Networking (ICN), transmission does not depend on the ends of communication, but on the content itself. In-network cache plays an important role in ICN, it empowers nodes in ICN better mobility. It ...
Blockchain-Based Anonymous Authentication with Selective Revocation for Smart Industrial Applications
(
IEEE Computer Society
, 2020 , Article)
Personal privacy disclosure is one of the most serious challenges in smart industrial applications. Anonymous authentication is an effective solution to protect personal privacy. However, the existing anonymous credential ...