The accelerated growth of networking technologies highlights the importance of Authentication and Access Control (AAC) as protection against associated attacks …
C Chen, X Chen, J Yu, W Wu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Temporary fork is a fundamental phenomenon in many blockchains with proof of work, and the analysis of temporary fork has recently drawn great attention. Different from existing …
C Lai, Y Ma, R Lu, Y Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The deployment of ultra-dense networks in the fifth-generation (5 G) network architecture can significantly improve the quality of wireless links, but this will cause frequent handovers …
K Viswanathan, A Yazdinejad - arXiv preprint arXiv:2201.02563, 2022 - arxiv.org
There is a growing need for authentication methodology in virtual reality applications. Current systems assume that the immersive experience technology is a collection of …
J Hu, M Reed, N Thomos… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) connected by software-defined networking (SDN) promises to bring great benefits to cyber-physical systems. However, the increased attack surface …
With the advancement of information and communication technology, Unmanned Aerial Vehicles (UAV), popularly known as drones, have also increased. The drones have been …
Smart grids improve the management of various power network components as well as the monitoring of power flows. Their deployments require very fast communication channels …
N Yathiraju - Research Journal of Computer Systems and …, 2022 - technicaljournals.org
Federated learning, which is a distributed machine learning approach for preserving privacy and is thus widely used in numerous privacy issue applications, is involved in the area …
Today, the world is seeing the fourth industrial revolution. Today, the globe is seeing the fourth commercial revolution. Internet of Things (IoT) and software‐defined network (SON) …