|
|
|
Qiang Li
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication tr...
ver más
|
|
|
|
|
|
|
Athanasios Goudosis and Sokratis Katsikas
The automatic identification system (AIS), despite its importance in worldwide navigation at sea, does not provide any defence mechanisms against deliberate misuse, e.g., by sea pirates, terrorists, business adversaries, or smugglers. Previous work has p...
ver más
|
|
|
|
|
|
|
Athanasios Goudosis and Sokratis Katsikas
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such i...
ver más
|
|
|
|
|
|
|
Hongbin Yang, Shuxiong Jiang, Wenfeng Shen and Zhou Lei
Provable Data Possession (PDP) protocol makes it possible for cloud users to check whether the cloud servers possess their original data without downloading all the data. However, most of the existing PDP schemes are based on either public key infrastruc...
ver más
|
|
|
|
|
|
|
Ugo Fiore and Francesco Rossi
Digital watermarking aims at protecting multimedia content by hiding into it some data that can be used for such purposes as, for example, intellectual property protection or integrity control. Sometimes, the owner of an image would prefer to not transmi...
ver más
|
|
|
|