- Emma Fitzgerald, Michal Pióro, Artur Tomaszewski:
Network lifetime maximization in wireless mesh networks for machine-to-machine communication.
- Hua Guo, Ya Gao, Tongge Xu, Xiyong Zhang, Jianfeng Ye:
A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks.
- Jiayan Zhang, Fei Li, Haoxi Zhang, Ruxiang Li, Yalin Li:
Intrusion detection system using deep learning for in-vehicle security.
- Tongzhen Si, Zhong Zhang, Shuang Liu:
Compact Triplet Loss for person re-identification in camera sensor networks.
- Marcus Walshe, Gregory Epiphaniou, Haider M. Al-Khateeb, Mohammad Hammoudeh, Vasilios Katos, Ali Dehghantanha:
Non-interactive zero knowledge proofs for the authentication of IoT devices in reduced connectivity environments.
- Nasir N. Hurrah, Shabir A. Parah, Javaid A. Sheikh, Fadi Al-Turjman, Khan Muhammad:
Secure data transmission framework for confidentiality in IoTs.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.