Blockchain in internet-of-things: Architecture, applications and research directions

F Ahmad, Z Ahmad, CA Kerrache… - … on computer and …, 2019 - ieeexplore.ieee.org
The emergence of Internet-of-Things (IoT) has attracted a massive response from different
stakeholders including industry, academia and research community due to the wide range of …

A systematic approach for cyber security in vehicular networks

F Ahmad, A Adnane, VNL Franqueira - Journal of Computer and …, 2016 - kar.kent.ac.uk
Vehicular Networks (VANET) are the largest real-life paradigm of ad hoc networks which aim
to ensure road safety and enhance drivers' comfort. In VANET, the vehicles communicate or …

A multipolicy authorization framework for grid security

B Lang, I Foster, F Siebenlist… - Fifth IEEE …, 2006 - ieeexplore.ieee.org
A Grid system is a Virtual Organization that is composed of several autonomous domains.
Authorization in such a system needs to be flexible and scalable to support multiple security …

Context-aware cluster based device-to-device communication to serve machine type communications

J Lianghai, L Man, HD Schotten - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Billions of Machine Type Communication (MTC) devices are foreseen to be deployed in next
ten years and therefore potentially open a new market for next generation wireless network …

Vehicular cloud networks: Architecture and security

F Ahmad, M Kazim, A Adnane - Guide to security assurance for cloud …, 2015 - Springer
Cloud computing has been widely adopted across the IT industry due to its scalable, cost-
effective, and efficient services. It has many applications in areas such as healthcare, mobile …

Tailoring LTE-advanced for M2M communication using wireless inband relay node

F Ahmad, SNK Marwat, Y Zaki… - WTC 2014; World …, 2014 - ieeexplore.ieee.org
Machine-to-Machine (M2M) communication is one of the newest research fields today and is
expected to play a vital role in business areas such as e-healthcare, logistics etc. Mobile …

[PDF][PDF] Machine-to-Machine communications toward smart logistics systems

N Gospića, B Bakmaza - Proceedings of 2nd Logistics International …, 2015 - academia.edu
Transport and logistics companies face continuous competitive pressure to maximize
capacity and improve efficiencies of their infrastructure as well as to meet the increasing …

Regulating wireless access costs for not vertically integrated content providers

X Hu, G Kesidis, SJ Baek - 2017 13th International Conference …, 2017 - ieeexplore.ieee.org
We consider a single, unaffiliated streaming content provider (CP) and another that is
vertically integrated (affiliated) with a cellular wireless ISP. We formulate a non-cooperative …

Economic Models for Access Networks Informing Regulatory Policy

X Hu - 2020 - search.proquest.com
With rapidly growing amounts of mobile users and mobile data traffic, the tension between
limited wireless resource supply and expanding demand is exacerbated. Economic …

Resource Management in Mobile Networks for Machine-to-Machine Communication

A Khan - 2020 - search.proquest.com
In the well-known mobile communication standard, Long Term Evolution (LTE), two types of
multiple access scheme were used, Orthogonal Frequency Division Multiple Access …