A comprehensive review on blockchains for Internet of Vehicles: Challenges and directions
Abstract Internet of Vehicles (IoVs) consists of smart vehicles, Autonomous Vehicles (AVs)
as well as roadside units (RSUs) that communicate wirelessly to provide enhanced …
as well as roadside units (RSUs) that communicate wirelessly to provide enhanced …
[BOOK][B] Statistical trend analysis of physically unclonable functions: An approach via text mining
Physically Unclonable Functions (PUFs) translate unavoidable variations in certain
parameters of materials, waves, or devices into random and unique signals. They have …
parameters of materials, waves, or devices into random and unique signals. They have …
Vulnerabilities and Attacks on CAN-Based 3D Printing/Additive Manufacturing
Recent advancements in 3D-printing/additive manufacturing has brought forth a new interest
in the use of controller area network (CAN) for multimodule, plug-and-play bus support for …
in the use of controller area network (CAN) for multimodule, plug-and-play bus support for …
CAN Bus: The Future of Additive Manufacturing (3D Printing)
Additive Manufacturing (AM) is gaining renewed popularity and attention due to low-cost
fabrication systems proliferating the market. Current communication protocols used in AM …
fabrication systems proliferating the market. Current communication protocols used in AM …
Secure data communication IoT and wireless sensor network for COVID-19
AM Manoharan, MG Sumithra - International Journal of …, 2021 - inderscienceonline.com
Coronavirus disease (COVID 19) is the dangerous pandemic that scares the world from
November 2019 affects more than 50% of the world population. Internet of things (IoT) is …
November 2019 affects more than 50% of the world population. Internet of things (IoT) is …
Anonymous Messaging for IoT and Cloud Security Using PUF-Based Protocols: A Lightweight Alternative to SSL
Modern IoT and cloud environments are increasingly vulnerable to sophisticated cyber-
attacks, and traditional security solutions are often inadequate, inefficient, or prone to …
attacks, and traditional security solutions are often inadequate, inefficient, or prone to …
[PDF][PDF] Usando as propriedades físicas dos componentes dos medidores inteligentes para torná-los mais seguros
AER Rincón - objdig.ufrj.br
Os avanços tecnológicos em hardware e software durante as últimas décadas permitiram e
incentivaram a proliferação de dispositivos inteligentes integrados a diferentes sistemas …
incentivaram a proliferação de dispositivos inteligentes integrados a diferentes sistemas …