A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Table of contents
2021
IEEE Internet of Things Journal
Ma 636 A Conditional Privacy Protection Scheme Based on Ring Signcryption for Vehicular Ad Hoc Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
Martini 596 FMAC: A Self-Adaptive MAC Protocol for Flocking of Flying Ad Hoc Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
doi:10.1109/jiot.2020.3042911
fatcat:wi6ehljchvhjdf3zpjxwug6z3u
Privacy-Preserving Solutions in Blockchain-Enabled Internet of Vehicles
2021
Applied Sciences
Moreover, it provides suggestions to researchers for future work in the field of privacy-preserving blockchain-enabled solutions for vehicular networks. ...
Blockchain technology can inherently guarantee the availability, integrity and immutability of data stored in IoV, yet it cannot protect privacy and data confidentiality on its own. ...
IoV is also a superset of Vehicular Ad-Hoc Networks (VANETs) and extends its scale and services [2] . ...
doi:10.3390/app11219792
fatcat:3yh7w3xqdzedrdwsiyndhq7j4e
Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)
2020
Vehicular Communications
Acknowledgement We thank the editor and the reviewers for their valuable comments, which helped us greatly in improving the content and presentation of the paper. ...
warnings, are ready for the widespread deployment in Vehicular Ad-hoc NETworks (VANETs). ...
: United States Department of Transportation V2I: Vehicle to Infrastructure V2V: Vehicle to Vehicle VANET: Vehicular Ad-hoc Network VHN: Vehicular Heterogeneous Networks VPKI: Vehicular Public Key Infrastructure ...
doi:10.1016/j.vehcom.2020.100247
fatcat:5h6t2z5mufgshpaojyp3xbrana
APPAS:A Privacy-Preserving Authentication Scheme Based on Pseudonym Ring in VSNs
2019
IEEE Access
Vehicular social networks (VSNs) provide a variety of services for users based on social relationships through vehicular ad hoc networks (VANETs). ...
In this paper, a privacy-preserving scheme based on the pseudonym ring in VSNs is proposed. Hierarchical network architecture and trust model are established. ...
In this paper, we propose a privacy-preserving authentication scheme based on pseudonym ring in VSNs (APPAS). ...
doi:10.1109/access.2019.2900593
fatcat:ldem5jmm3rbq5gxgrwswgvij4i
Blockchain for the Internet of Vehicles towards Intelligent Transportation Systems: A Survey
[article]
2020
arXiv
pre-print
In this paper, we present a contemporary survey on the latest advancement in blockchain for IoV. ...
By allowing the development of a common information exchange platform between vehicles and heterogeneous vehicular networks, this integration aims to create a better environment and public space to the ...
Nevertheless, most of the aforesaid aspects are almost common with vehicular ad hoc network scenarios. ...
arXiv:2007.06022v1
fatcat:j7zjypmq3jhzjeqejeedjgdepa
IOV Privacy Protection System Based on Double-Layered Chains
2019
Wireless Communications and Mobile Computing
Specifically, an IOV double-layered chain model is constructed to simulate a semicentralized system that is convenient for government to supervise; also, a RSA protocol based on zero-knowledge proof (ZKP ...
Taking an aim of solving this problem, a privacy protection system on double-layered chain basis is designed to eliminate the said security risk during vehicle data communication. ...
Hu et al. introduces an efficient privacy-preserving protocol with confidentiality for vehicular ad hoc networks based on group signcryption [9] . ...
doi:10.1155/2019/3013562
fatcat:u2qcxiqndndubo43av54rz4coa
A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions
[article]
2022
arXiv
pre-print
Blockchain technology has been emerged as a decentralized approach for enhanced security without depending on trusted third parties to run services. ...
In this work, we present the state-of-the-art of Blockchain-enabled IoVs (BIoV) with a particular focus on their applications such as crowdsourcing-based applications, energy trading, traffic congestion ...
IoV is a vehicular ad hoc network (VANET) that has been connected to the Internet [23] . ...
arXiv:2203.10708v1
fatcat:sozptzz5l5a27oh5rukujcg32a
Internet of things security: A top-down survey
2018
Computer Networks
Finally, we give a general classification of existing solutions and comparison based on important parameters. ...
This technology offers a huge business value for organizations and provides opportunities for many existing applications such as energy, healthcare and other sectors. ...
It is the case, for example, of AMI in smart grids and ad-hoc infrastructures in Vehicular Networks. In [6] , authors interested in healthcare applications. ...
doi:10.1016/j.comnet.2018.03.012
fatcat:xbczp44t6neqxcfy74q6rsvuci
2020 Index IEEE Transactions on Vehicular Technology Vol. 69
2020
IEEE Transactions on Vehicular Technology
Revocable Data-Sharing Scheme in VANETs; TVT Dec. 2020 15933-15946 Hoseini, S.A., Ding, M., Hassan, M., and Chen, Y., Analyzing the Impact of Molecular Re-Radiation on the MIMO Capacity in High-Frequency ...
+ Check author entry for coauthors ami-mFading Channels With Integer and Non-Integerm; TVT March 2020 2785-2801 Hoang, T.M., Tran, X.N., Nguyen, B.C., and Dung, L.T., On the Performance of MIMO Full-Duplex ...
., +, TVT May 2020 5403-5415 Full Session Key Agreement Scheme Based on Chaotic Map in Vehicular Ad Hoc Networks. ...
doi:10.1109/tvt.2021.3055470
fatcat:536l4pgnufhixneoa3a3dibdma
All One Needs to Know about Fog Computing and Related Edge Computing Paradigms
2019
Journal of systems architecture
Next, we provide a taxonomy of research topics in fog computing, and through a comprehensive survey, we summarize and categorize the efforts on fog computing and its related computing paradigms. ...
In this paper, we first provide a tutorial on fog computing and its related computing paradigms, including their similarities and differences. ...
The authors in [421] propose a privacy-preserving protocol for vehicular road surface condition monitoring. ...
doi:10.1016/j.sysarc.2019.02.009
fatcat:udonbl6rerfwdap2psex7ryloa
Privacy-preserving Communication for Vehicular with Multi Receiver Conditionally Anonymous Ring Signcryption
2016
Proceedings of the 2016 3rd International Conference on Materials Engineering, Manufacturing Technology and Control
unpublished
In this paper, we propose a privacy preserving protocol based on multi -receiver conditional anonymous ring signcryption. ...
The protocol does not depend on any fully trusted authority during the tracing phase. ...
The literature [3, 4] presented scheme based on the pseudonym, although the pseudonym signature scheme can let users privacy be protected, but each a set of pseudonyms for a period of time to be replaced ...
doi:10.2991/icmemtc-16.2016.96
fatcat:pysy4jjhxrapzggzp5grezqbg4
2020 Index IEEE Systems Journal Vol. 14
2020
IEEE Systems Journal
., +, JSYST Dec. 2020 5176-5186
Ad hoc networks
Agent Pseudonymous Authentication-Based Conditional Privacy Preserva-
tion: An Emergent Intelligence Technique. ...
., +, JSYST March 2020 298-309 A Novel Privacy-Preserving Authentication Scheme for V2G Networks. ...
., +, 2585 -2588 Energy-Efficient IoT-Fog-Cloud Architectural Paradigm for Real-Time Wildfire Prediction and Forecasting. 2003 -2011 Agent Pseudonymous Authentication-Based Conditional Privacy Preservation ...
doi:10.1109/jsyst.2021.3054547
fatcat:zf2aafvnfzbeje32qei5563myu
2021 Index IEEE Internet of Things Journal Vol. 8
2021
IEEE Internet of Things Journal
The Author Index contains the primary entry for each item, listed under the first author's name. ...
., +, JIoT June 1, 2021 8865-8882 A Conditional Privacy Protection Scheme Based on Ring Signcryption for Vehicular Ad Hoc Networks. ...
., +, JIoT Jan. 15, 2021 778-790 Digital signatures A Conditional Privacy Protection Scheme Based on Ring Signcryption for Vehicular Ad Hoc Networks. ...
doi:10.1109/jiot.2022.3141840
fatcat:42a2qzt4jnbwxihxp6rzosha3y
Online) International Journal of Network Security is published both in traditional paper form
2015
International Journal of Network Security
unpublished
In 2007, Camenisch, Neven and Shelat proposed an adap-tive oblivious transfer (OT) scheme in which a sender has n messages, of which a receiver can adaptively choose to receive k one-after-the-other. ...
In this paper, we show that the scheme has a drawback that the sender can serve a single receiver only once. The drawback results from the deterministic encryption used. ...
The authors gratefully acknowledge the anonymous reviewers for their valuable comments.
Acknowledgement We would like to thank the anonymous reviewers for their valuable comments and suggestions. ...
fatcat:tup6p3z7pzc4dpeyn3blmj3foi
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2017
International Journal of Network Security
unpublished
A secret image sharing with deep-steganography and two-stage authentication based on matrix encoding is proposed. ...
This scheme firstly employed Wang and Su's sharing scheme to share a secret image into n shadows. ...
In
Acknowledgement The authors would like to thank the anonymous reviewers for their useful comments. ...
fatcat:btwmayvuhzbotmhejwow3wbldq
« Previous
Showing results 1 — 15 out of 16 results