Software supply chain compromises are on the rise. From the effects of XCodeGhost to SolarWinds, hackers have identified that targeting weak points in the supply chain allows …
Timestamps allow us to identify a date and time when a piece of data existed or an event took place. For example, we use timestamps to establish the date when we grant a patent …
Blockchain-like ledger databases emerge in recent years as a more efficient alternative to permissioned blockchains. Conventional ledger databases mostly rely on authenticated …
J Xu, J Xiang, D Yang - IEEE Transactions on Wireless …, 2015 - ieeexplore.ieee.org
Mobile crowdsensing can enable numerous attractive novel sensing applications due to the prominent advantages such as wide spatiotemporal coverage, low cost, good scalability …
H Zhong, J Wen, J Cui, S Zhang - Tsinghua Science and …, 2016 - ieeexplore.ieee.org
Vehicle Ad hoc NETworks (VANET) can enhance traffic safety and improve traffic efficiency through cooperative communication among vehicles, roadside infrastructure, and traffic …
Y Jiang, S Ge, X Shen - IEEE Access, 2020 - ieeexplore.ieee.org
As special ad-hoc networks, vehicular ad-hoc networks (VANETs) support vehicles to communicate with each other via opportunistic wireless links. In order to protect privacy of …
H Zhong, B Huang, J Cui, Y Xu, L Liu - Ieee Access, 2017 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) have increased in popularity in recent years and play an extremely important role in the intelligent transportation field. However, the demands of …
The recent explosion in shared media content and sensed data produced by mobile end- users is challenging well-established principles and assumptions in data trust models. A …