|
|
|
Vitalii Yesin, Mikolaj Karpinski, Maryna Yesina, Vladyslav Vilihura, Ruslan Kozak and Ruslan Shevchuk
The growing popularity of data outsourcing to third-party cloud servers has a downside, related to the serious concerns of data owners about their security due to possible leakage. The desire to reduce the risk of loss of data confidentiality has become ...
ver más
|
|
|
|
|
|
Xinyang Deng, Tianhan Gao, Nan Guo, Jiayu Qi and Cong Zhao
Privacy disclosure has become a key challenge in vehicular ad hoc networks (VANETs). Although IEEE, ERSI, etc. suggest that a pseudonym-based scheme is a solution, how to support pseudonym management and vehicle authentication is still an open issue. In ...
ver más
|
|
|
|
|
|
V.V. Kholmogorov,V.V. Baranyuk
Pág. 39 - 47
Defining a set of standards is one of the most important components of creating an information system, since standards, firstly, simplify almost all life cycle processes due to their clarity and structure, and, secondly, allow, if they are properly selec...
ver más
|
|
|
|
|
|
Tiago Gomes, Pedro Sousa, Miguel Silva, Mongkol Ekpanyapong and Sandro Pinto
In the new Internet of Things (IoT) era, embedded Field-Programmable Gate Array (FPGA) technology is enabling the deployment of custom-tailored embedded IoT solutions for handling different application requirements and workloads. Combined with the open R...
ver más
|
|
|
|
|
|
Jing Chen, Tong Li and Rui Zhu
False messages sent by malicious or selfish vehicle nodes will reduce the operation efficiency of the Internet of Vehicles, and can even endanger drivers in serious cases. Therefore, it is very important to detect malicious vehicle nodes in the network i...
ver más
|
|
|