Survey on issues and recent advances in vehicular public-key infrastructure (VPKI)
Public-key infrastructure (PKI) provides the essential foundation for public-key cryptography,
and security is often bootstrapped from a PKI. Standardization bodies, organizations …
and security is often bootstrapped from a PKI. Standardization bodies, organizations …
A comprehensive survey on authentication and attack detection schemes that threaten it in vehicular ad-hoc networks
As Vehicular Ad-hoc Networks (VANETs) bring fantastic revolution to intelligent
transportation systems, their own security has become an important research topic …
transportation systems, their own security has become an important research topic …
RFM-based repurchase behavior for customer classification and segmentation
Customer behavior modeling and classification are well-studied areas for applications in
retail. Past studies implemented the purchase behavior modeling based on the physical …
retail. Past studies implemented the purchase behavior modeling based on the physical …
A secure energy trading system for electric vehicles in smart communities using blockchain
In this paper a secure energy system is proposed that consists of private and public
blockchains for vehicles in sustainable cities and society. The former protects vehicle …
blockchains for vehicles in sustainable cities and society. The former protects vehicle …
The Internet of Vehicles and Sustainability—Reflections on Environmental, Social, and Corporate Governance
The Internet of Vehicles (IoV) has generated great interest among researchers from different
disciplines as it is multidisciplinary research. Sustainability for the IoV requires solutions …
disciplines as it is multidisciplinary research. Sustainability for the IoV requires solutions …
Deep learning-based intrusion detection methods in cyber-physical systems: Challenges and future trends
A cyber-physical system (CPS) integrates various interconnected physical processes,
computing resources, and networking units, as well as monitors the process and …
computing resources, and networking units, as well as monitors the process and …
Potential future directions in optimization of students' performance prediction system
Previous studies widely report the optimization of performance predictions to highlight at‐
risk students and advance the achievement of excellent students. They also have …
risk students and advance the achievement of excellent students. They also have …
Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks
In the study, we propose a double blockchain based vehicular system for optimizing data
storage and securing communication in Internet of Vehicles (IoV) networks. We propose an …
storage and securing communication in Internet of Vehicles (IoV) networks. We propose an …
Blockchain-based one-time authentication for secure v2x communication against insiders and authority compromise attacks
One significant security challenge in vehicular networks is defending against malicious
members' attacks, including insiders and compromised authorities. Insiders are legitimate …
members' attacks, including insiders and compromised authorities. Insiders are legitimate …
Conditional privacy-preserving authentication scheme for V2V communication without pseudonyms
QL Wang, YY Li, ZQ Tan, N Fan, GD Yao - Journal of Information Security …, 2023 - Elsevier
Pseudonym is widely used in conditional privacy-preserving authentication (CPPA) scheme
for vehicle-to-vehicle (V2V) communication in vehicular ad hoc networks (VANETs) in order …
for vehicle-to-vehicle (V2V) communication in vehicular ad hoc networks (VANETs) in order …