All Stories

  1. Taxonomy-Based Lightweight Cryptographic Frameworks for Secure Industrial IoT: A Survey
  2. Chebyshev Polynomial Based Emergency Conditions With Authentication Scheme for 5G-Assisted Vehicular Fog Computing
  3. Machine learning-enhanced optimization of exhaust gas recirculation strategies for superior diesel engine performance and emissions control: A synergistic experimental and computational study
  4. A quantum-resilient lattice-based security framework for internet of medical things in healthcare systems
  5. Quantum-Enhanced AI and Machine Learning: Transforming Predictive Analytics
  6. Reinforcement Guided Genetic Algorithm for Application Mapping in Network-on-Chip Architectures: Towards Transparent and Efficient MPSoC Scheduling
  7. Secure Offline Smart Office Automation System Using ESP32 and Bluetooth Control Architecture
  8. A Bilinear Pairing-Based Anonymous Authentication Scheme for 5G-Assisted Vehicular Fog Computing
  9. Coherent Taxonomy of Vehicular Ad Hoc Networks (VANETs) Enabled by Fog Computing: A Review
  10. The fog computing for internet of things: review, characteristics and challenges, and open issues
  11. Software defined networking for internet of things: review, techniques, challenges, and future directions
  12. CLA-FC5G: A Certificateless Authentication Scheme Using Fog Computing for 5G-Assisted Vehicular Networks
  13. D-BlockAuth: An Authentication Scheme-Based Dual Blockchain for 5G-Assisted Vehicular Fog Computing
  14. Efficient Blockchain-Based Pseudonym Authentication Scheme Supporting Revocation for 5G-Assisted Vehicular Fog Computing
  15. FC-LSR: Fog Computing-Based Lightweight Sybil Resistant Scheme in 5G-Enabled Vehicular Networks
  16. HAFC: Handover Authentication Scheme Based on Fog Computing for 5G-Assisted Vehicular Blockchain Networks
  17. Integrating Safety in VANETs: A Taxonomy and Systematic Review of VEINS Models
  18. Lattice-Based Cryptography and Fog Computing Based Efficient Anonymous Authentication Scheme for 5G-Assisted Vehicular Communications
  19. Oblivious Transfer-Based Authentication and Privacy-Preserving Protocol for 5G-Enabled Vehicular Fog Computing
  20. A Novel DDoS Mitigation Strategy in 5G-Based Vehicular Networks Using Chebyshev Polynomials
  21. Long range technology for internet of things: review, challenges, and future directions
  22. Review of routing protocol for low power and lossy network in the internet of things
  23. L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system
  24. The blockchain internet of things: review, opportunities, challenges, and recommendations
  25. Bluetooth low energy for internet of things: review, challenges, and open issues
  26. Validation of the toolkit for fake news awareness in social media
  27. Wireless sensor networks in the internet of things: review, techniques, challenges, and future directions
  28. Proposed enhanced link failure rerouting mechanism for software-defined exchange point
  29. ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing
  30. Unmanned aerial vehicle: a review and future directions
  31. DDoS attacks detection using machine learning and deep learning techniques: analysis and comparison
  32. Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
  33. ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing
  34. Vector Autoregression Model-Based Forecasting of Reference Evapotranspiration in Malaysia
  35. Chebyshev Polynomial-Based Fog Computing Scheme Supporting Pseudonym Revocation for 5G-Enabled Vehicular Networks
  36. Lattice-Based Lightweight Quantum Resistant Scheme in 5G-Enabled Vehicular Networks
  37. A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework
  38. ES-SECS/GEM: An Efficient Security Mechanism for SECS/GEM Communications
  39. FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks
  40. Replay-Attack Detection and Prevention Mechanism in Industry 4.0 Landscape for Secure SECS/GEM Communications
  41. COVID-19 Vehicle Based on an Efficient Mutual Authentication Scheme for 5G-Enabled Vehicular Fog Computing
  42. Provably Secure with Efficient Data Sharing Scheme for Fifth-Generation (5G)-Enabled Vehicular Networks without Road-Side Unit (RSU)
  43. Detection Mechanisms for Peer-to-Peer Botnets
  44. Man-in-the-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation
  45. CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks
  46. Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks
  47. A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks
  48. Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks
  49. Proposed security mechanism for preventing fake router advertisement attack in IPv6 link-local network
  50. MSR-DoS: Modular Square Root-Based Scheme to Resist Denial of Service (DoS) Attacks in 5G-Enabled Vehicular Networks
  51. SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
  52. Security and Privacy Schemes in Vehicular Ad-Hoc Network With Identity-Based Cryptography Approach: A Survey
  53. Towards Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
  54. An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network
  55. Review of Prevention Schemes for Man-In-The-Middle (MITM) Attack in Vehicular Ad hoc Networks
  56. Review of Prevention Schemes for Modification Attack in Vehicular Ad hoc Networks
  57. Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks
  58. VPPCS: VANET-Based Privacy-Preserving Communication Scheme
  59. Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks
  60. LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network
  61. Towards The Optimization of Road Side Unit Placement Using Genetic Algorithm