Security of vehicular ad-hoc networks: A comprehensive survey

AK Malhi, S Batra, HS Pannu - Computers & Security, 2020‏ - Elsevier
Vehicles equipped with significant computing, communication and sensing (also known as
“smart” vehicles), are being focused by Intelligent Transportation Systems (ITS). The …

A survey of applications of identity-based cryptography in mobile ad-hoc networks

S Zhao, A Aggarwal, R Frost… - … Communications surveys & …, 2011‏ - ieeexplore.ieee.org
Security in mobile ad-hoc networks (MANETs) continues to attract attention after years of
research. Recent advances in identity-based cryptography (IBC) sheds light on this problem …

Learning an invariant hilbert space for domain adaptation

S Herath, M Harandi, F Porikli - Proceedings of the IEEE …, 2017‏ - openaccess.thecvf.com
This paper introduces a learning scheme to construct a Hilbert space (ie, a vector space
along its inner product) to address both unsupervised and semi-supervised domain …

A key management and secure routing integrated framework for mobile ad-hoc networks

S Zhao, R Kent, A Aggarwal - Ad Hoc Networks, 2013‏ - Elsevier
Key management (KM) and secure routing (SR) are two most important issues for Mobile Ad-
hoc Networks (MANETs), but previous solutions tend to consider them separately. This leads …

ISDSR+: improving the security and availability of secure routing protocol

H Kojima, N Yanai, JP Cruz - IEEE Access, 2019‏ - ieeexplore.ieee.org
In ad hoc networks that allow devices to dynamically configure networks via wireless
communication, a secure routing protocol is a technology that guarantees the validity of …

A secure routing protocol in proactive security approach for mobile ad-hoc networks

S Zhao, A Aggarwal, S Liu, H Wu - 2008 IEEE wireless …, 2008‏ - ieeexplore.ieee.org
Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of
research. We therefore propose to design a secure routing protocol in a new approach. This …

Performance Evaluation of ID-Based Aggregate Signature Scheme Based on Lattice for Wireless Multi-hop Secure Routing Protocols

S Ookura, H Kojima, N Yanai - 2024 7th International …, 2024‏ - ieeexplore.ieee.org
To establish trusted routes, secure routing protocols have been extensively researched.
These protocols employ authentication mechanisms, such as digital signatures, to thwart …

An integrated key management and secure routing framework for mobile ad-hoc networks

S Zhao, RD Kent, A Aggarwal - 2012 Tenth Annual International …, 2012‏ - ieeexplore.ieee.org
Key management (KM) and secure routing (SR) are two most important issues for Mobile Ad-
hoc Networks (MANETs), but previous solutions tend to consider them separately. This leads …

Using domain partitioning in wrapper design for IP cores under power constraints

TE Yu, T Yoneda, D Zhao… - 25th IEEE VLSI Test …, 2007‏ - ieeexplore.ieee.org
This paper presents a novel design method for power-aware test wrappers targeting
embedded cores with multiple clock domains. We show that effective partitioning of clock …

Performance evaluation for the signature algorithm of isdsr on raspberry pi

H Kojima, N Yanai - 2017 Fifth International Symposium on …, 2017‏ - ieeexplore.ieee.org
Infrastructure monitoring systems, such as bridge, tunnel, railway, and so on, are
applications which adopt wireless sensor networks (WSNs). Generally, a typical WSN …