-
1
A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks
Published 2022-02-01Subjects: Get full text
Article -
2
SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks
Published 2021-12-01Subjects: Get full text
Article -
3
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network
Published 2020-10-01Subjects: Get full text
Article -
4
CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks
Published 2022-07-01Subjects: Get full text
Article -
5
L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system.
Published 2023-01-01“…Such concerns are optimal targets for conditional privacy-preserving authentication (CPPA) methods. …”
Get full text
Article -
6
FC-PA: Fog Computing-Based Pseudonym Authentication Scheme in 5G-Enabled Vehicular Networks
Published 2023-01-01Subjects: Get full text
Article -
7
Dickson polynomial-based secure group authentication scheme for Internet of Things
Published 2024-02-01Subjects: “…Conditional privacy preservation…”
Get full text
Article -
8
Chebyshev Polynomial-Based Fog Computing Scheme Supporting Pseudonym Revocation for 5G-Enabled Vehicular Networks
Published 2023-02-01Subjects: “…privacy and security…”
Get full text
Article -
9
MSR-DoS: Modular Square Root-Based Scheme to Resist Denial of Service (DoS) Attacks in 5G-Enabled Vehicular Networks
Published 2022-01-01Subjects: Get full text
Article -
10
ANAA-Fog: A Novel Anonymous Authentication Scheme for 5G-Enabled Vehicular Fog Computing
Published 2023-03-01Subjects: Get full text
Article -
11
Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks
Published 2022-06-01Subjects: Get full text
Article -
12
Lattice-Based Lightweight Quantum Resistant Scheme in 5G-Enabled Vehicular Networks
Published 2023-01-01Subjects: Get full text
Article -
13
Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing
Published 2023-03-01“…Several researchers have proposed secure authentication techniques for addressing privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. …”
Get full text
Article -
14
Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN
Published 2023-02-01“…Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. …”
Get full text
Article -
15
Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices
Published 2023-01-01“…IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns. One of the big issues in securing IoT communications is that traditional cryptographical protocols incur high computational costs and are not suitable for resource‐constrained devices. …”
Get full text
Article -
16
A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework
Published 2023-01-01“…The third class comprises the requirements that satisfy privacy, authentication, trust management, reliability, and revocation of the VANET security-based VEINS framework. …”
Get full text
Article -
17
Unveiling the Metaverse: Exploring Emerging Trends, Multifaceted Perspectives, and Future Challenges
Published 2023-01-01“…Nevertheless, it confronts obstacles, including privacy, security, equitable access, and ethical concerns, necessitating the construction of robust legal and ethical frameworks for the common good. …”
Get full text
Article -
18
Majority Voting Ensemble Classifier for Detecting Keylogging Attack on Internet of Things
Published 2024-01-01“…Regarding IoT, intrusions can result in severe problems, including service disruption, data theft, privacy violations, and even bodily injury. One of the intrusion attacks is a keylogging attack, sometimes referred to as keystroke logging or keyboard capture, which is a type of cyberattack in which the attacker secretly observes and records keystrokes made on a device’s keyboard. …”
Get full text
Article -
19
IoT empowered smart cybersecurity framework for intrusion detection in internet of drones
Published 2023-10-01“…The main objective of this study is to examine the latest privacy and security challenges impacting the network of drones (NoD). …”
Get full text
Article