过去一年中添加的文章,按日期排序

Blockchain-empowered Secure Spectrum Sharing for Next Generation Train Networks

SM Asad, X Zhang, Y Sun, RNB Rais, S Hussain… - IEEE …, 2024 - ieeexplore.ieee.org
48 天前 - … of private mobile networks (PMN) driven by next generation train networks (NGTNs) …
sharing with mobile network operators (MNOs) to provide privacy driven architecture. For …

ORAN-B5G: A next generation open radio access network architecture with machine learning for beyond 5G in industrial 5.0

AA Khan, AA Laghari, AM Baqasah… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
50 天前 - next level, where it simply removes vendors’ lock-in scenarios [15, 16, 17]. It ensures
privacy and security … concerns regarding architectural security and its transaction privacy. It …

Space–Air–Ground–Sea Integrated Network with Federated Learning

H Zhao, F Ji, Y Wang, K Yao, F Chen - Remote Sensing, 2024 - mdpi.com
52 天前 - network (SAGSIN) is a promising heterogeneous network framework for the next
generation mobile … option for the balance between privacy protection and accuracy levels. …

Exploring Privacy Issues in Mission Critical Communication: Navigating 5G and Beyond Networks

P Dass, M Gräfenstein, S Köpsell - arXiv preprint arXiv:2405.01492, 2024 - arxiv.org
53 天前 - privacy challenges in MCC architecture. Finally, we propose privacy controls to
establish a next-generation privacy-… towards addressing nextgeneration privacy concerns. …

[PDF][PDF] Survey of Cross-Layer Design Approaches in Cellular Networks: Issues and Possible Solutions

T Alexander - researchgate.net
55 天前 - … cross-layer design in cellular networks, discuss the implementations proposed by
… , and consider future research topics, such as security and privacy analysis, which may aid in …

Use of Emerging Technologies in Healthcare 4.0

IA Shah, NZ Jhanjhi, SN Brohi - Advances in Computational …, 2024 - igi-global.com
60 天前 - … for wireless body area networks and focused on the importance and how advanced
technology helps next-generationsecurity and privacy in the future healthcare system. …

… Scheme Based Efficient Monitoring Key Ciphertext Attributes with Encryption Access Control with Blockchain and Key Mechanism for Security in Cloud Computing

AK Srivastava, D Pandey, A Agarwal - Wireless Personal Communications, 2024 - Springer
61 天前 - privacy and user AC have to be considered while encrypting the data [11]. The
cryptographic techniques help to preserve privacy and provide security … provide data privacy and …

Access-Side DDoS Defense for Space-Air-Ground Integrated 6G V2X Networks

X Chen, W Feng, Y Chen, N Ge… - IEEE Open Journal of the …, 2024 - ieeexplore.ieee.org
62 天前 - safety of vehicles and an important fulcrum for realizing data privacy, making
network security … defense methods, such as the next generation firewall (NGFW) and intrusion …

Cloud-Integrated Clean Fuel Generation for Solar-Hydrogen Production with Wireless Sensor Networks

N Naveenkumar, V Sridevi, R Bharathi… - 2024 International …, 2024 - ieeexplore.ieee.org
62 天前 - … Integration with the cloud introduces security vulnerabilities that compromise data
privacy. Dependence on cloud connection raises reliability problems and scalability issues …

Smart Contract-Based Access Control Scheme for Blockchain Assisted 6G-Enabled IoT-Based Big Data Driven Healthcare Cyber Physical Systems

S Saha, AK Das, M Wazid, YH Park… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
64 天前 - … the patients’ privacy. The primary and essential reasons are the security and privacy
of … According to the “Office of the National Coordinator for Health Information Technology (…