[HTML][HTML] Vehicles communications handover in 5G: A survey

MM Elsayed, KM Hosny, MM Fouda, MM Khashaba - ICT Express, 2023 - Elsevier
A communications system consists of interconnected telecommunications networks,
transmission systems, relay stations, tributary stations, and terminal equipment. Increasing …

Privacy attack on IoT: a systematic literature review

LM Zagi, B Aziz - 2020 International Conference on ICT for …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a technology that is a daily necessity for humans. Unfortunately, so
far, the IoT still disables privacy for various reasons. This circumstance has intrigued many …

Efficient authentication for Internet of Things devices in information management systems

X Wu, F Ren, Y Li, Z Chen, X Tao - … and Mobile Computing, 2021 - Wiley Online Library
With the rapid development of the Internet of Things (IoT) technology, it has been widely
used in various fields. IoT device as an information collection unit can be built into an …

NLADSS: Design of Connectivity as a Service (CaaS) Model using Node-Level Augmentation & Dynamic Sleep Scheduling for Heterogeneous Wireless Network …

PK Gurumallu - International Journal of Intelligent …, 2022 - search.ebscohost.com
Seamless connectivity is need-of-the-hour for high-speed wireless networks. With the advent
of 5th Generation (5G) wireless devices, users from different networks require inter-network …

Performance analysis of V2V and V2I channels for autonomous smart car

DL Luu, C Lupu, H Alshareefi… - 2022 23rd International …, 2022 - ieeexplore.ieee.org
The trend of vehicle applications have increased with the development of connected
autonomous vehicles (CAVs), which requires network communication topology to exchange …

Research on Music Multiterminal Audio Authentication Based on Wireless Network

D Li - Wireless Communications and Mobile Computing, 2021 - Wiley Online Library
The current music multiterminal audio authentication algorithm does not consider the
mutation of music signal, which leads to poor tamper detection ability and long time of audio …

[PDF][PDF] Secure Biometric-Based Authentication For Multi-Level Authentication Cloud Computing

S Godi, R Rao - PSYCHOLOGY AND EDUCATION, 2021 - researchgate.net
In a wired network, security protocols such as encryption, authentication, and other methods
are recognized as standards by the industry. Even so, there seems to be no data given …