… Design of provably secure authentication protocol for edge-centric maritime transportation … RFID: Towards low latency and reliable DAG task scheduling over dynamic vehicular clouds…
… the applicability when applied to security protection of the industrial Internet of things (IIoT), … from 2000 to 2021 were investigated and the security threats faced by IIoT were summarized. …
… occurring at its inception-preventative medicine. Police departments can reduce fear by changing their activities to include more frequent and sustained contacts with citizens. Ultimately, …
… analytical framework associated with the integrated systemic process-oriented approach, with minor changes in the exogenous variables, internal variable and evaluative criteria, is …
… Due to homogeneity of the service offered – remittance, product design was not considered in this study. Promotion was also left out since from observation, this is very …