Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Jan 2, 2023 · The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm.
The purpose of this research is to present the EGPKC with optimum key generation using the EGPKC-OAFA algorithm for the purpose of protecting individual privacy ...
The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate ...
The goal of this research is to protect people's privacy in the IoT by using the oppositional artificial flora optimization (EGPKC-OAFA) algorithm to generate ...
People also ask
This review paper firstly analyses the reasons why the current vehicle network is vulnerable to network attack and summarizes the three implementation methods.
We employ Arithmetic Optimization Algorithm (AOA) to design a secure intelligent clustering named AOACNET. AOA is used to achieve optimality of vehicular ...
Jul 2, 2024 · In this paper, based on mobility predictability, we propose a novel anonymous communication scheme called SCPT to address the security handover ...
This study designs an optimal Lightweight Cryptography with Dragonfly Firefly (LWC-DFFF) optimization algorithm to achieve privacy preserving communication in ...
Mar 17, 2023 · In this paper, we propose a consensus algorithm for vehicular networks named as Vehicular network Based Consensus Algorithm (VBCA) to ensure data security ...
Jun 12, 2024 · With an optimization technique, our algorithm can generate a way to route vehicles based on distance vectors that do not depend on network or ...