Search

Your search keyword '"You, Ilsun"' showing total 79 results

Search Constraints

Start Over You searched for: Author "You, Ilsun" Remove constraint Author: "You, Ilsun"
79 results on '"You, Ilsun"'

Search Results

1. Security of 5G-V2X: Technologies, Standardization, and Research Directions.

2. Secure and Energy-Efficient Handover in Fog Networks Using Blockchain-Based DMM.

3. LoRaWAN-Based Energy-Efficient Surveillance by Drones for Intelligent Transportation Systems.

5. GDTN: Genome-Based Delay Tolerant Network Formation in Heterogeneous 5G Using Inter-UA Collaboration.

6. A security gateway application for End-to-End M2M communications.

7. Intelligent healthcare service based on context inference using smart device.

9. Can Formal Security Verification Really Be Optional? Scrutinizing the Security of IMD Authentication Protocols.

10. Decentralized Policy Coordination in Mobile Sensing with Consensual Communication.

11. An efficient deadlock prevention approach for service oriented transaction processing

12. caTBUA: Context-aware ticket-based binding update authentication protocol for trust-enabled mobile networks.

13. Special issue on natural and secure computing in modern soft computing application.

15. A Secrecy Transmission Protocol with Energy Harvesting for Federated Learning.

16. An efficient classification approach for large-scale mobile ubiquitous computing

17. Special Issue "Internet of Things for Smart Homes".

18. Editorial: Security and Privacy in Computing and Communications.

19. Enabling Heterogeneous Deterministic Networks with Smart Collaborative Theory.

20. SMDFbs: Specification-Based Misbehavior Detection for False Base Stations.

21. An Enhanced LoRaWAN Security Protocol for Privacy Preservation in IoT with a Case Study on a Smart Factory-Enabled Parking System.

22. Ultra-Reliable Communications for Industrial Internet of Things: Design Considerations and Channel Modeling.

25. Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol.

27. APSec1.0: Innovative Security Protocol Design with Formal Security Analysis for the Artificial Pancreas System.

29. Secure and Efficient Context-Aware Localization of Drones in Urban Scenarios.

30. Efficient Management and Fast Handovers in Software Defined Wireless Networks Using UAVs.

31. Towards secure asynchronous messaging with forward secrecy and mutual authentication.

32. A lightweight D2D security protocol with request-forecasting for next-generation mobile networks.

33. Empirical Mode Decomposition-empowered Network Traffic Anomaly Detection for Secure Multipath TCP Communications.

34. Long-term location privacy protection for location-based services in mobile cloud computing.

36. A lightweight D2D security protocol with request-forecasting for next-generation mobile networks.

37. An Innovative Framework for Dynamic Traffic Lights Management Based on the Combined Use of Fuzzy Logic and Several Network Architectures.

38. A secure wireless communication system integrating RSA, Diffie-Hellman PKDS, intelligent protection-key chains and a Data Connection Core in a 4G environment.

39. Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols.

40. ACSP: A novel security protocol against counting attack for UHF RFID systems

41. Energy-aware weighted graph based dynamic topology control algorithm

42. A cross-layer protocol of spectrum mobility and handover in cognitive LTE networks

43. A Fault Tolerant Mechanism for UE Authentication in 5G Networks.

44. Acceleration of Inner-Pairing Product Operation for Secure Biometric Verification †.

45. Improved Mitigation of Cyber Threats in IIoT for Smart Cities: A New-Era Approach and Scheme.

46. Acceleration Feature Extraction of Human Body Based on Wearable Devices.

47. Efficient Resource Allocation for Backhaul-Aware Unmanned Air Vehicles-to-Everything (U2X).

48. Dissimilarity Metric Based on Local Neighboring Information and Genetic Programming for Data Dissemination in Vehicular Ad Hoc Networks (VANETs).

49. SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems.

50. A software classification scheme using binary-level characteristics for efficient software filtering.

Catalog

Books, media, physical & digital resources