Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Ehsan Meamari"'
Autor:
Chien-chung Shen, Ehsan Meamari
In VANET, although data sharing among vehicles improves safety and traffic, malicious data providers might share false information to compromise its effectiveness. One typical solution to address this issue is to manage the trustworthiness of data p
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::11b096383c82d45388125331d964a4fa
https://doi.org/10.36227/techrxiv.21202166
https://doi.org/10.36227/techrxiv.21202166
Publikováno v:
CISS
Attribute Based Encryption (ABE) has emerged as an informtion-centric public key cryptographic system which allows a data owner to share data, according to an access policy, with multiple data users based on the attributes they possess, without knowi
Publikováno v:
IEEE ICBC
The global Electronic Health Record (EHR) market is growing dramatically and has already hit $31.5 billion in 2018. To safeguard the security of EHR data and privacy of patients, fine-grained information access and sharing mechanisms are essential fo
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::19e903de113f9f35babb2252f1806ebc
Publikováno v:
ICBCT
Attribute-based access control makes access control decisions based on the assigned attributes of subjects and the access policies to protect objects by mediating operations from the subjects. Authority, which validates attributes of subjects, is one
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::47104b73683ba3bfc770db4b251f84c0
http://arxiv.org/abs/1903.07009
http://arxiv.org/abs/1903.07009
Cognitive Radio (CR) technology is a solution to solve the lack of spectrum by allowing the secondary user to use licensed bands. There are several potential security challenges for cognitive radio like Jamming, PUE and Lion attack. Lion attack is mu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f823ed9327638d39d39562ad277182f6
With the advancement of communication, the spectrum shortage problem becomes a serious problem for future generations. The cognitive radio technology is proposed to address this concern. In cognitive radio networks, the secondary users can access spe
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e5f5e895f4538ea5e95e6fc388dc4f99
Autonomous vehicles are capable of sensing their environment and navigating without any human inputs. However, when autonomous vehicles are involved in accidents between themselves or with human subjects, liability must be indubitably decided based o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e3391dd9fe8b137b4b886645b642141a
http://arxiv.org/abs/1809.04732
http://arxiv.org/abs/1809.04732
Publikováno v:
Peer-to-Peer Networking and Applications. 9:1128-1144
An important issue in Peer-to-Peer networks is to encourage users to share with others as they use the resources of the network. However, some nodes may only consume from users without giving anything in return. To fix this problem, we can incorporat
Publikováno v:
International Journal of Communication Systems. 29:602-619
Many methods are suggested to preserve anonymity of users for peer-to-peer P2P networks. Most of these methods, by relying on established anonymous solutions on client/server applications, are presented for unstructured P2P networks. However, structu
Publikováno v:
Arabian Journal for Science and Engineering. 39:4609-4616
The main mechanism in IEEE 802.11 to access the medium is distributed coordination function (DCF) as a random access scheme based on carrier sense multiple access with collision avoidance. DCF describes two access techniques for packet transmission,