Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "International Journal of Intelligent Systems"
DOI: 10.1002/int.22644
Abstract: The application of intelligent computing in Internet of Things (IoTs) makes IoTs systems such as telemedicine, inâvehicle IoT, and smart home more intelligent and efficient. Secure communication and secure resource sharing among intelligent terminals are…
read more here.
Keywords:
communication;
group;
intelligent terminals;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Wireless Networks"
DOI: 10.1007/s11276-016-1197-z
Abstract: Security must be provided in VANET as it is open to various attacks due to malicious vehicle, Brute force attack, misbehaving and faulty nodes, malicious users, and malicious nodes. The attacks can be occurred due…
read more here.
Keywords:
key authentication;
vanet;
detection;
group key ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-016-3366-x
Abstract: Secure group communication is desired in many group oriented applications of mobile ad hoc network (MANET), and fruitful communication achieved only via trustable network environment. In order to enhance the privacy among group members, proper…
read more here.
Keywords:
manet;
communication;
group;
management ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2017 at "Wireless Personal Communications"
DOI: 10.1007/s11277-017-4163-x
Abstract: Abstract More than two participants implement communication over the network at the same time, aiming to establish a common session key, and it is named group session communication. Nowadays, many researchers lay emphasis on achieve…
read more here.
Keywords:
key agreement;
authentication;
group;
protocol ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Wireless Personal Communications"
DOI: 10.1007/s11277-020-07540-7
Abstract: Deep space network is a must-have technology to improve communication, navigation, and propulsion in future space missions, a very long physical distance among space entities is difficult to overcome efficiently as a space mission could…
read more here.
Keywords:
space;
reliable end;
decryption;
end end ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2017 at "Science China Information Sciences"
DOI: 10.1007/s11432-017-9212-2
Abstract: 1School of Computer Science and Technology, Beijing Institute of Technology, Beijing 100081, China; 2Research Center of Massive Language Information Processing and Cloud Computing Application, Beijing 100081, China; 3Institute of Computer and Communication Engineering, Zhengzhou University…
read more here.
Keywords:
cluster asymmetric;
key agreement;
cross cluster;
agreement wireless ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.2993296
Abstract: Group Key Exchange (GKE) is required for secure group communication with high confidentiality. In particular, a trusted authority can handle issues that happen by the malicious actions of group members, but it is expensive to…
read more here.
Keywords:
implementation;
constant round;
key exchange;
group ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3130471
Abstract: In the fog computing paradigms, fog nodes are closer to terminal devices and can extend services to the edge of the network, thereby reducing the impact of high latency and restricted networks in the Internet…
read more here.
Keywords:
group;
scheme;
group key;
fog computing ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"
DOI: 10.1109/tdsc.2021.3138445
Abstract: Group-oriented applications generally support communications for multiple entities (e.g., users and/or devices) through open networks. Typical requirements of group communications include secrecy, authentication, sender non-repudiation, and sender privacy. However, conventional approaches such as group key…
read more here.
Keywords:
sender non;
non repudiation;
group;
group key ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Computational Intelligence and Neuroscience"
DOI: 10.1155/2022/6296841
Abstract: The Internet of Vehicles (IoV) communication key management level controls the confidentiality and security of its data, which may withstand user identity-based attacks such as electronic spoofing. The IoV group's key is updated with a…
read more here.
Keywords:
reinforcement learning;
group;
management;
group key ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "International Journal of Embedded Systems"
DOI: 10.1504/ijes.2019.10025637
Abstract: Asymmetric group key agreement protocol is to negotiate a shared group encryption key. Each member can calculate a decryption key corresponding to the encryption key. With the rapid development of network and system technology, secure…
read more here.
Keywords:
key agreement;
group;
agreement protocol;
group key ... See more keywords