A novel trust-based security and privacy model for internet of vehicles using encryption and steganography
High-speed wireless network technologies play a vital role in autonomous vehicle
communication systems (AVS), ie, IoV (Internet of Vehicles), and enhance the effectiveness …
communication systems (AVS), ie, IoV (Internet of Vehicles), and enhance the effectiveness …
An enhanced intrusion detection model based on improved kNN in WSNs
Aiming at the intrusion detection problem of the wireless sensor network (WSN), considering
the combined characteristics of the wireless sensor network, we consider setting up a …
the combined characteristics of the wireless sensor network, we consider setting up a …
Improved authenticated key agreement scheme for fog‐driven IoT healthcare system
TY Wu, T Wang, YQ Lee, W Zheng… - Security and …, 2021 - Wiley Online Library
The Internet of things (IoT) has been widely used for various applications including medical
and transportation systems, among others. Smart medical systems have become the most …
and transportation systems, among others. Smart medical systems have become the most …
Simplified Phasmatodea population evolution algorithm for optimization
This work proposes a population evolution algorithm to deal with optimization problems
based on the evolution characteristics of the Phasmatodea (stick insect) population, called …
based on the evolution characteristics of the Phasmatodea (stick insect) population, called …
Toward a secure smart-home IoT access control scheme based on home registration approach
The extensive application of the Internet of Things (IoT) and artificial intelligence technology
has greatly promoted the construction and development of smart cities. Smart home as the …
has greatly promoted the construction and development of smart cities. Smart home as the …
Rotating behind security: A lightweight authentication protocol based on iot-enabled cloud computing environments
With the rapid development of technology based on the Internet of Things (IoT), numerous
IoT devices are being used on a daily basis. The rise in cloud computing plays a crucial role …
IoT devices are being used on a daily basis. The rise in cloud computing plays a crucial role …
A parallel compact gannet optimization algorithm for solving engineering optimization problems
The Gannet Optimization Algorithm (GOA) has good performance, but there is still room for
improvement in memory consumption and convergence. In this paper, an improved Gannet …
improvement in memory consumption and convergence. In this paper, an improved Gannet …
Cellulose nanocrystal chiral photonic micro-flakes for multilevel anti-counterfeiting and identification
Counterfeiting and forgery have caused enormous economic loss and many safety
concerns, and many approaches have been employed for anti-counterfeiting. However …
concerns, and many approaches have been employed for anti-counterfeiting. However …
Embellishment of upconversion nanoparticles with ultrasmall perovskite quantum dots for full‐color tunable, dual‐modal luminescence anticounterfeiting
K Du, M Zhang, Y Li, H Li, K Liu, C Li… - Advanced Optical …, 2021 - Wiley Online Library
Advanced fluorescent anticounterfeiting technology has attracted widespread attention and
encourages people to develop reliable luminescent materials with multiple colors and …
encourages people to develop reliable luminescent materials with multiple colors and …
A provably secure authentication and key exchange protocol in vehicular ad hoc networks
While cloud computing and Internet of Things (IoT) technologies have gradually matured,
mobile intelligent transportation systems have begun to be widely used. In particular, the …
mobile intelligent transportation systems have begun to be widely used. In particular, the …