Deeper Insight Into Why Authentication Schemes in IoT Environments Fail to Achieve the Desired Security.
IEEE Trans. Inf. Forensics Secur., 2024
A provably secure and practical end-to-end authentication scheme for tactile Industrial Internet of Things.
Pervasive Mob. Comput., 2024
Conditional Artificial Potential Field-Based Autonomous Vehicle Safety Control with Interference of Lane Changing in Mixed Traffic Scenario.
Sensors, 2019
Recommendation algorithm based on user score probability and project type.
EURASIP J. Wirel. Commun. Netw., 2019
Delegated Proof of Stake With Downgrade: A Secure and Efficient Blockchain Consensus Algorithm With Downgrade Mechanism.
IEEE Access, 2019
The Survey on Intellectual Property Based on Blockchain Technology.
Proceedings of the IEEE International Conference on Industrial Cyber Physical Systems, 2019
Design and analysis of a general data evaluation system based on social networks.
EURASIP J. Wirel. Commun. Netw., 2018
A self-adaptive K selection mechanism for re-authentication load balancing in large-scale systems.
J. Supercomput., 2012
Security analysis and improvements of IEEE standard 802.16 in next generation wireless metropolitan access network.
Wirel. Commun. Mob. Comput., 2011
A Fast Formation Flocking Scheme for a Group of Interactive Distributed Mobile Nodes in Autonomous Networks.
Mob. Networks Appl., 2010
An energy-efficient scheme in next-generation sensor networks.
Int. J. Commun. Syst., 2010
Equivalent permutation capabilities between time-division optical omega networks and non-optical extra-stage omega networks.
IEEE/ACM Trans. Netw., 2001
Equivalent permutation capabilities between time division optical omega network and non-optical extra stage omega network.
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999