# عنوان البحث مكان النشر تاريخ النشر عرض
1 Chebyshev polynomial based emergency conditions with authentication scheme for 5G-assisted vehicular fog computing IEEE Transactions on Dependable and Secure Computing 2025-05-14 visibility
2 Efficient implementation of post-quantum digital signatures on Raspberry Pi Discover Applied Sciences 2025-06-25 visibility
3 Routing protocols strategies for flying Ad-Hoc network (FANET): review, taxonomy, and open research issues Alexandria Engineering Journal 2025-06-25 visibility
4 Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication Peer-to-Peer Networking and Applications 2025-06-25 visibility
5 Integrating Safety in VANETs: A Taxonomy and Systematic Review of VEINS Models IEEE Access 2025-06-25 visibility
6 A Bilinear Pairing-Based Anonymous Authentication Scheme for 5G-Assisted Vehicular Fog Computing Arabian Journal for Science and Engineering 2025-06-25 visibility
7 Coherent taxonomy of vehicular ad hoc networks (vanets)-enabled by fog computing: a review https://ieeexplore.ieee.org/abstract/document/10633260 2025-06-25 visibility
8 FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network Internet of Things 2025-06-25 visibility
9 L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system Plos one 2025-06-25 visibility
10 Vector autoregression model-based forecasting of reference evapotranspiration in malaysia Sustainability 2025-06-25 visibility
11 Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks Electronics 2025-06-25 visibility
12 Lattice-Based Lightweight Quantum Resistant Scheme in 5G-Enabled Vehicular Networks Mathematics 2025-06-25 visibility
13 Man-In-The-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation Symmetry 2025-06-25 visibility
14 CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks Sensors 2025-06-25 visibility
15 Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks Applied Sciences 2025-06-25 visibility
16 Survey of Authentication and Privacy Schemes in Vehicular Ad Hoc Networks IEEE Sensors Journal 2025-06-25 visibility
17 An Efficient Identity-based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network Symmetry 2025-06-25 visibility
18 Realistic Heterogeneous Genetic-based RSU Placement Solution for V2I Networks. Int. Arab J. Inf. Technol. 2025-06-25 visibility
19 Vessel berthing system using internet of things (IoT) for smart port AIP Conference Proceedings 2025-06-25 visibility
20 Quantum-Enhanced AI and Machine Learning: Transforming Predictive Analytics Recent Advances in Electrical & Electronic Engineering 2025-06-25 visibility
21 A Software-Centric Evaluation of the VEINS Framework in Vehicular Ad-Hoc Networks Journal of Robotics and Control (JRC) 2025-06-25 visibility
22 Investigating quantum-resilient security mechanisms for flying ad-hoc networks (fanets) Journal of Robotics and Control (JRC) 2025-06-25 visibility
23 D-BlockAuth: An Authentication Scheme Based Dual Blockchain for 5G-Assisted Vehicular Fog Computing IEEE Access 2025-06-25 visibility
24 SADetection: Security Mechanisms to Detect SLAAC Attack in IPv6 Link-Local Network Informatica 2025-06-25 visibility
25 Review of Prevention Schemes for Replay Attack in Vehicular Ad hoc Networks (VANETs) 2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP) 2025-06-25 visibility
26 Techniques of Early Incident Detection and Traffic Monitoring Centre in VANETs: A Review. Journal of Communications 2025-06-25 visibility
27 Performance Analysis of QoS in MANET based on IEEE 802.11 b 2020 IEEE International Conference for Innovation in Technology (INOCON) 2025-06-25 visibility
28 Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks International Conference on Advances in Cyber Security 2025-06-25 visibility
29 ID-PPA: Robust identity-based privacy-preserving authentication scheme for a vehicular ad-hoc network International Conference on Advances in Cyber Security 2025-06-25 visibility
30 A comprehensive survey on vehicular ad hoc networks (vanets) 2021 International Conference on Advanced Computer Applications (ACA) 2025-06-25 visibility
31 Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks IEEE Access 2025-06-25 visibility
32 Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks Applied Sciences 2025-06-25 visibility
33 Deep learning based network intrusion detection for unmanned aerial vehicle (uav) 2024 7th World Conference on Computing and Communication Technologies (WCCCT) 2025-06-25 visibility