Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Electromagnetic Waves and Applications"
DOI: 10.1080/09205071.2018.1497549
Abstract: ABSTRACT Wireless networks perform computing on grouped users together through networks that suffer with improper scheduling and less security awareness results in terms of bandwidth, increase in error rate, power constraints, authentication problem, etc. In…
read more here.
Keywords:
enhanced security;
security aware;
security;
wireless networks ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "IEEE Access"
DOI: 10.1109/access.2024.3387083
Abstract: In the 5G and beyond 5G networks, achieving security-aware data transmission needs to convert clients ’ requests into a service function chain (SFC), each service function (SF) providing a certain security guarantee. With diverse configuration…
read more here.
Keywords:
protection;
security;
service function;
security aware ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "IEEE Access"
DOI: 10.1109/access.2025.3552842
Abstract: Low energy consumption and high security are two key challenges in achieving efficient data transmission in LoRa-based wireless communication. The present research focuses on enhancing the efficiency and security of data transmission with low energy…
read more here.
Keywords:
energy;
protocol;
security aware;
bit mapping ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Sensors Journal"
DOI: 10.1109/jsen.2020.3012046
Abstract: Intelligent transportation systems have been envisioned to bring more intelligence and cooperative sensing to meet the imminent demands of overall improved autonomous transportation. However, dynamic era of modern applications and fixed architecture of legacy Internet…
read more here.
Keywords:
transportation systems;
transportation;
security aware;
aware data ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Journal of Solid-State Circuits"
DOI: 10.1109/jssc.2021.3112182
Abstract: The development of security-aware mobile devices using wide-input–output (IO) nonvolatile memory (NVM) is hindered by high peak current, large area overhead for high read bandwidth (BWR), and considerable energy consumption for data movement between NVM…
read more here.
Keywords:
mram macro;
stt mram;
security aware;
near memory ... See more keywords