Privacy-aware and security-enhanced efficient matchmaking encryption

J Sun, G Xu, T Zhang, X Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Data sharing technologies enable users to outsource data and privately share information
with arbitrary recipients without geographic barriers. However, existing efforts for secure …

Flexible and secure cross-domain signcrypted data authorization in multi-platoon vehicular networks

Y Zhao, H Yu, Y Yang, L Xu, S Pan… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Autonomous Vehicle Platooning (AVP) presents a promising approach to reducing energy
expenses, improving traffic safety, and enhancing capacity. In multi-platoon vehicular …

[HTML][HTML] Comprehensive Review of Traffic Modeling: Towards Autonomous Vehicles

Ł Łach, D Svyetlichnyy - Applied Sciences, 2024 - mdpi.com
Autonomous vehicles (AVs) have the potential to revolutionize transportation by offering
safer, more efficient, and convenient mobility solutions. As AV technology advances, there is …

Predefined-Time Bipartite Time-Varying Formation Tracking Control of Networked Autonomous Surface Vehicles Via Hierarchical Control Approach

J Pan, T Han, B Xiao, H Yan - IEEE Transactions on Vehicular …, 2024 - ieeexplore.ieee.org
As increasingly prevalent technologies in autonomous driving, autonomous surface vehicles
(ASVs) have been widely applied to accomplish different practical tasks. However, there …

Deep Trajectory Recovery Approach of Offline Vehicles in the Internet of Vehicles

X Han, DX Zhou, G Shen, X Kong… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Multi-modal trajectory analysis and trajectory recovery are essential tasks in transportation
research, especially for offline vehicles, which enable comprehensive understanding of …

A2E: Attribute-based Anonymity-Enhanced Authentication for Accessing Driverless Taxi Service

Y Gong, X Chang, J Mišić, VB Mišić - arXiv preprint arXiv:2407.11320, 2024 - arxiv.org
Driverless vehicle as a taxi is gaining more attention due to its potential to enhance urban
transportation efficiency. However, both unforeseen incidents led by unsupervised physical …

An encryption-encoding architecture for security enhancement in 5G communication networks

A Das, D Mishra, A Rout, SN Mishra - ITM Web of Conferences, 2023 - itm-conferences.org
This article introduces a hybrid architecture of cryptography and coding technique to provide
security in 5G communication networks. There are various types of attacks in 5G …