Showing 1 - 20 results of 26 for search 'COMMUNICATION THEORY', query time: 0.70s Refine Results
  1. 1
  2. 2
    ...The Internet of Intelligent Things (IoIT) communication environment can be utilized in various...
    Get full text
    Article
  3. 3
    ...Internet of Vehicles (IoV) is treated as an extension of Vehicle-to-Vehicle (V2V) communication...
    Get full text
    Article
  4. 4
    ...The advancement in Information and Communications Technology (ICT) has changed the entire paradigm...
    Get full text
    Article
  5. 5
    ..., as an important facet of IoT, has gained its focus for smart intelligent systems. As users communicate with smart...
    Get full text
    Article
  6. 6
    ...For secure communication between any two neighboring sensing devices on the Internet of Things (IoT...
    Get full text
    Article
  7. 7
    ... the need for security and privacy without incurring additional communication and computation costs...
    Get full text
    Article
  8. 8
  9. 9
    ... machine-to-machine communication and link to the cloud platforms for data storage. IoMT has the ability...
    Get full text
    Article
  10. 10
    ... in Information and Communications Technology (ICT). Because of this advancement, new computing and communication...
    Get full text
    Article
  11. 11
    by Kisung Park, Youngho Park, Yohan Park, Ashok Kumar Das
    Published 2018-01-01
    ...With the increasing use of mobile devices, a secure communication and key exchange become...
    Get full text
    Article
  12. 12
    ...In recent years, the Internet of things (IoT) has become an encouraging communication paradigm...
    Get full text
    Article
  13. 13
    ... the legitimacy of an authorized user over an insecure communication channel. Most of the existing authentication...
    Get full text
    Article
  14. 14
  15. 15
    .... However, the communication among vehicles is susceptible to various security threats because the sensitive...
    Get full text
    Article
  16. 16
    ... and ruin the whole functioning of the communication. The sinkhole attacker nodes (<inline-formula> <math...
    Get full text
    Article
  17. 17
    by Ashok Kumar Das, Vanga Odelu, Adrijit Goswami
    Published 2014-01-01
    ... scheme performs significantly better than other existing schemes in terms of communication, computational...
    Get full text
    Article
  18. 18
    ... registration center in the authentication process, for which it is having lowest communication cost compared...
    Get full text
    Article
  19. 19
    ...Due to wide-spread use of the Information and Communications Technology (ICT) and Internet...
    Get full text
    Article
  20. 20
    by Ashok Kumar Das, Adrijit Goswami
    Published 2015-04-01
    .... In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s...
    Get full text
    Article