J Petit, F Schaub, M Feiri, F Kargl - … communications surveys & …, 2014 - ieeexplore.ieee.org
Safety-critical applications in cooperative vehicular networks require authentication of nodes and messages. Yet, privacy of individual vehicles and drivers must be maintained …
The growing popularity and development of data mining technologies bring serious threat to the security of individual,'s sensitive information. An emerging research topic in data mining …
Abstract Indoor Location Based Services (LBS), such as indoor navigation and tracking, still have to deal with both technical and non-technical challenges. For this reason, they have …
The widespread adoption of continuously connected smartphones and tablets developed the usage of mobile applications, among which many use location to provide geolocated …
S Pramanik - Achieving Full Realization and Mitigating the …, 2022 - igi-global.com
Because privacy concerns in IoT devices are the most sensitive of all the difficulties, such an extreme growth in IoT usage has an impact on the privacy and life spans of IoT devices …
One of the recent trends of networking and mobile technology is mobile cloud computing (MCC) that provides rich computational, storage resources and services in clouds to mobile …
AA Abi Sen, FA Eassa, K Jambi, M Yamin - International Journal of …, 2018 - Springer
Internet of things (IOT) paradigm is changing day to day lives towards sophisticated automation and enhancing living standards of our societies. The most of “Things” in IOT are …
S Pal, Z Jadidi - Applied Sciences, 2021 - mdpi.com
Industrial Internet of Things (IIoT) can be seen as an extension of the Internet of Things (IoT) services and applications to industry with the inclusion of Industry 4.0 that provides …