T Li, S Tian, A Liu, H Liu, T Pei - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
The large number of mobile-sensing vehicles traveling in cities offer a novel solution to the collection of vast amounts of multimedia data packets. When a vehicle passes through the …
CH Ling, CC Lee, CC Yang, MS Hwang - Int. J. Netw. Secur., 2017 - academia.edu
An algorithm that a user has authenticated over remote devices should be designed to consider the limitations of computation and lower power in a wireless sensor networks …
An online/offline identity‐based short signature (IBSS) protocol permits the signer to produce an online IBSS in real time from a precomputed offline IBSS when given a record. Such …
Monitoring of marine polluted areas is an emergency task, where efficiency and low-power consumption are challenging for the recovery of marine monitoring equipment. Wireless …
T Zou, Z Li, S Li, S Lin - Sensors, 2017 - mdpi.com
Target detection is a widely used application for area surveillance, elder care, and fire alarms; its purpose is to find a particular object or event in a region of interest. Usually, fixed …
CT Li, CC Lee, CY Weng - Journal of Internet Technology, 2018 - jit.ndhu.edu.tw
Secure three party node authentication and key establishment scheme for data exchange in the Internet of Things (IoT) applications enables two resourceconstrained nodes to establish …
Due to recent advances in wireless communications technologies and its changing demand in mobile ad hoc networks, it is needed to design energy efficient network. These networks …
J Liu, Z Hao, J Wang, X Zhang - International Journal of Network …, 2023 - ijns.jalaxy.com.tw
The rapid increase in terminal devices in the robot environment has brought many security risks. Detecting abnormal traffic efficiently has become an essential task in robot safety …
R Guo, H Shi - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Certificateless public key cryptography with bilinear pairing needs costly operations, which is not appropriate for a practical application. In this paper, we present a certificateless public …