Zobrazeno 1 - 2
of 2
pro vyhledávání: '"Chadha Zrari"'
Publikováno v:
Procedia Computer Science
Knowledge-Based and Intelligent Information & Engineering Systems
Knowledge-Based and Intelligent Information & Engineering Systems, Sep 2018, Belgrade, Serbia. pp.821-830, ⟨10.1016/j.procs.2018.08.016⟩
FNC/MobiSPC
The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops
The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, Aug 2018, Grande Canarie, Spain. pp.243-250, ⟨10.1016/j.procs.2018.07.167⟩
Knowledge-Based and Intelligent Information & Engineering Systems
Knowledge-Based and Intelligent Information & Engineering Systems, Sep 2018, Belgrade, Serbia. pp.821-830, ⟨10.1016/j.procs.2018.08.016⟩
FNC/MobiSPC
The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops
The 15th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2018) / The 13th International Conference on Future Networks and Communications (FNC-2018) / Affiliated Workshops, Aug 2018, Grande Canarie, Spain. pp.243-250, ⟨10.1016/j.procs.2018.07.167⟩
International audience; A wide variety of Intelligent Transportation Systems (ITS) are developed to increase travel safety, improve traffic management and minimize environmental impact. C-ITS (cooperative ITS) are a subclass of ITS based on the commu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d076242231663e05778094b016bf9324
https://hal-emse.ccsd.cnrs.fr/emse-01904570
https://hal-emse.ccsd.cnrs.fr/emse-01904570
Publikováno v:
KES
Security is a very important concept in the growth and the development of the mobile agent technology. However, in most of researches, security properties are envisaged in the implementation phase. Nevertheless, the integration of security properties