Showing 1 - 18 results of 18 for search 'COMMUNICATION THEORY', query time: 1.14s Refine Results
  1. 1
    ...Internet of Vehicles (IoV) is treated as an extension of Vehicle-to-Vehicle (V2V) communication...
    Get full text
    Article
  2. 2
    ...The advancement in Information and Communications Technology (ICT) has changed the entire paradigm...
    Get full text
    Article
  3. 3
    ..., as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart...
    Get full text
    Article
  4. 4
    ...For secure communication between any two neighboring sensing devices on the Internet of Things (IoT...
    Get full text
    Article
  5. 5
    ... the need for security and privacy without incurring additional communication and computation costs...
    Get full text
    Article
  6. 6
    ... machine-to-machine communication and link to the cloud platforms for data storage. IoMT has the ability...
    Get full text
    Article
  7. 7
    ... in Information and Communications Technology (ICT). Because of this advancement, new computing and communication...
    Get full text
    Article
  8. 8
    by Kisung Park, Youngho Park, Yohan Park, Ashok Kumar Das
    Published 2018-01-01
    ...With the increasing use of mobile devices, a secure communication and key exchange become...
    Get full text
    Article
  9. 9
    ...In recent years, the Internet of things (IoT) has become an encouraging communication paradigm...
    Get full text
    Article
  10. 10
    ... the legitimacy of an authorized user over an insecure communication channel. Most of the existing authentication...
    Get full text
    Article
  11. 11
  12. 12
    .... However, the communication among vehicles is susceptible to various security threats because the sensitive...
    Get full text
    Article
  13. 13
    ... and ruin the whole functioning of the communication. The sinkhole attacker nodes (<inline-formula> <math...
    Get full text
    Article
  14. 14
    ...Due to wide-spread use of the Information and Communications Technology (ICT) and Internet...
    Get full text
    Article
  15. 15
  16. 16
  17. 17
    ... between roadside units for their secure communications. The rigorous formal and informal security analysis...
    Get full text
    Article
  18. 18
    ...A secure authentication protocol plays a crucial role in securing communications over wireless...
    Get full text
    Article