|
|
|
Qiang Li
Cellular vehicle to everything (C-V2X) is a technology to achieve vehicle networking, which can improve traffic efficiency and traffic safety. As a special network, the C-V2X system faces many security risks. The vehicle to vehicle (V2V) communication tr...
ver más
|
|
|
|
|
|
|
Athanasios Goudosis and Sokratis Katsikas
The automatic identification system (AIS), despite its importance in worldwide navigation at sea, does not provide any defence mechanisms against deliberate misuse, e.g., by sea pirates, terrorists, business adversaries, or smugglers. Previous work has p...
ver más
|
|
|
|
|
|
|
Qihong Yu, Jiguo Li and Sai Ji
In the past 10 years, many side-channel attacks have been discovered and exploited one after another by attackers, which have greatly damaged the security of cryptographic systems. Since no existing anonymous broadcast encryption scheme can resist the si...
ver más
|
|
|
|
|
|
|
Hanae Mgarbi,Mohamed Yassin Chkouri,Abderrahim Tahiri
Pág. 37 - 42
Before the development of the web, we talk about the portfolio; it was represented by a simple portfolio of student skills in paper form. This form of representation of skills and professional career has continued to develop over the years. After a succe...
ver más
|
|
|
|
|
|
|
Hanae Mgarbi,Mohamed Yassin Chkouri,Abderrahim Tahiri
Pág. 37 - 42
Before the development of the web, we talk about the portfolio; it was represented by a simple portfolio of student skills in paper form. This form of representation of skills and professional career has continued to develop over the years. After a succe...
ver más
|
|
|
|
|
|
|
Athanasios Goudosis and Sokratis Katsikas
The reporting of incidents of misconduct, violence, sexual assault, harassment, and other types of crime that constitute a major concern in modern society is of significant value when investigating such incidents. Unfortunately, people involved in such i...
ver más
|
|
|
|
|
|
|
Qingnan Chen, Ting Wu, Chengnan Hu, Anbang Chen and Qiuhua Zheng
Cross-domain authenticated asymmetric group key agreement allows group members in different domains to establish a secure group communication channel and the senders can be anyone. However, the existing schemes do not meet the requirement of batch verifi...
ver más
|
|
|
|
|
|
|
Nikos Fotiou and George C. Polyzos
Information-Centric Networking (ICN) is an emerging communication paradigm built around content names. Securing ICN using named-based security is, therefore, a natural choice. For this paper, we designed and evaluated name-based security solutions that s...
ver más
|
|
|
|
|
|
|
Fuxiao Zhou, Yanping Li and Yong Ding
Since the roadside infrastructure and vehicles come from different manufacturers, vehicular ad hoc networks (VANETs) now are extremely heterogeneous. It is difficult to communicate securely for heterogeneous facilities in VANETs because secure communicat...
ver más
|
|
|
|
|
|
|
Maria Romero,Angel Mauricio Mujica Sanchez,Edgardo Pineda,Yesenia Ccamapaza,Nohely Zavalla
Pág. 166 - 178
Molecular markers based on simple sequence repeats (SSRs) constitute a highly effective instrument in the identification of quinoa genotypes (Chenopodium quinoa), and they are very useful in the management and conservation of germplasm banks. T...
ver más
|
|
|
|
|
|
|
K.Ruben Raju,Danekula Rajya Lakshmi,Prof.Dr.G.Manoj Someswar
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Cloud Computing, 1?1. doi:10.1109/tcc.2016.2545668. One of the conditions of submission of a paper for publication is that authors declare explicitly that thei...
ver más
|
|
|
|
|
|
|
Yueying Huang and Junjie Yang
-
|
|
|
|
|
|
|
Ugo Fiore and Francesco Rossi
Digital watermarking aims at protecting multimedia content by hiding into it some data that can be used for such purposes as, for example, intellectual property protection or integrity control. Sometimes, the owner of an image would prefer to not transmi...
ver más
|
|
|
|
|
|
|
Ugo Fiore and Francesco Rossi
|
|
|
|
|
|
|
Yitao Chen, Weiwei Han
Pág. 629 - 636
Authenticated multiple key exchange (AMKE) protocols not only allow participants to warrant multiple session keys within one run of the protocol but also ensure the authenticity of the other party. Many AMKE protocols using bilinear pairings have been pr...
ver más
|
|
|
|
|
|
|
Elena - Madalina VATAMANESCU,Florina PÎNZARU,Lucian Claudiu ANGHEL
Pág. 265 - 282
The paper approaches the common identity and common bond theories in analyzing the group patterns of interaction, their causes, processes and outcomes from a managerial perspective. The distinction between identity and bond referred to people?s different...
ver más
|
|
|
|
|
|
|
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc...
ver más
|
|
|
|
|
|
|
Luisanna Cocco, Roberto Tonelli and Michele Marchesi
This work presents a Self Sovereign Identity based system proposal to show how Blockchain, Building Information Modeling, Internet of Thing devices, and Self Sovereign Identity concepts can support the process of building digitalization, guaranteeing the...
ver más
|
|
|
|
|
|
|
Luisanna Cocco, Roberto Tonelli and Michele Marchesi
This work presents how a digital identity management system can support food supply chains in guaranteeing the quality of the products marketed and the compliance of the several supply-chain?s nodes to standards and technical regulations. Specific goal o...
ver más
|
|
|
|
|
|
|
Ruth Tsuria
This study explores the relationship between politics and religion, resistance and community, on social media through the case study of #EmptyThePews. #EmptyThePews was created in August 2017 after the events in Charlottesville, calling users who attend ...
ver más
|
|
|
|