1 |
Chebyshev polynomial based emergency conditions with authentication scheme for 5G-assisted vehicular fog computing |
IEEE Transactions on Dependable and Secure Computing |
2025-05-14 |
visibility
|
2 |
Efficient implementation of post-quantum digital signatures on Raspberry Pi |
Discover Applied Sciences |
2025-06-25 |
visibility
|
3 |
Routing protocols strategies for flying Ad-Hoc network (FANET): review, taxonomy, and open research issues |
Alexandria Engineering Journal |
2025-06-25 |
visibility
|
4 |
Fog computing and blockchain technology based certificateless authentication scheme in 5G-assisted vehicular communication |
Peer-to-Peer Networking and Applications |
2025-06-25 |
visibility
|
5 |
Integrating Safety in VANETs: A Taxonomy and Systematic Review of VEINS Models |
IEEE Access |
2025-06-25 |
visibility
|
6 |
A Bilinear Pairing-Based Anonymous Authentication Scheme for 5G-Assisted Vehicular Fog Computing |
Arabian Journal for Science and Engineering |
2025-06-25 |
visibility
|
7 |
Coherent taxonomy of vehicular ad hoc networks (vanets)-enabled by fog computing: a review |
https://ieeexplore.ieee.org/abstract/document/10633260 |
2025-06-25 |
visibility
|
8 |
FCA-VBN: Fog computing-based authentication scheme for 5G-assisted vehicular blockchain network |
Internet of Things |
2025-06-25 |
visibility
|
9 |
L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system |
Plos one |
2025-06-25 |
visibility
|
10 |
Vector autoregression model-based forecasting of reference evapotranspiration in malaysia |
Sustainability |
2025-06-25 |
visibility
|
11 |
Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5G-enabled vehicular networks |
Electronics |
2025-06-25 |
visibility
|
12 |
Lattice-Based Lightweight Quantum Resistant Scheme in 5G-Enabled Vehicular Networks |
Mathematics |
2025-06-25 |
visibility
|
13 |
Man-In-The-Middle Attacks in Mobile Ad Hoc Networks (MANETs): Analysis and Evaluation |
Symmetry |
2025-06-25 |
visibility
|
14 |
CM-CPPA: Chaotic Map-Based Conditional Privacy-Preserving Authentication Scheme in 5G-Enabled Vehicular Networks |
Sensors |
2025-06-25 |
visibility
|
15 |
Chebyshev Polynomial-Based Scheme for Resisting Side-Channel Attacks in 5G-Enabled Vehicular Networks |
Applied Sciences |
2025-06-25 |
visibility
|
16 |
Survey of Authentication and Privacy Schemes in Vehicular Ad Hoc Networks |
IEEE Sensors Journal |
2025-06-25 |
visibility
|
17 |
An Efficient Identity-based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network |
Symmetry |
2025-06-25 |
visibility
|
18 |
Realistic Heterogeneous Genetic-based RSU Placement Solution for V2I Networks. |
Int. Arab J. Inf. Technol. |
2025-06-25 |
visibility
|
19 |
Vessel berthing system using internet of things (IoT) for smart port |
AIP Conference Proceedings |
2025-06-25 |
visibility
|
20 |
Quantum-Enhanced AI and Machine Learning: Transforming Predictive Analytics |
Recent Advances in Electrical & Electronic Engineering |
2025-06-25 |
visibility
|
21 |
A Software-Centric Evaluation of the VEINS Framework in Vehicular Ad-Hoc Networks |
Journal of Robotics and Control (JRC) |
2025-06-25 |
visibility
|
22 |
Investigating quantum-resilient security mechanisms for flying ad-hoc networks (fanets) |
Journal of Robotics and Control (JRC) |
2025-06-25 |
visibility
|
23 |
D-BlockAuth: An Authentication Scheme Based Dual Blockchain for 5G-Assisted Vehicular Fog Computing |
IEEE Access |
2025-06-25 |
visibility
|
24 |
SADetection: Security Mechanisms to Detect SLAAC Attack in IPv6 Link-Local Network |
Informatica |
2025-06-25 |
visibility
|
25 |
Review of Prevention Schemes for Replay Attack in Vehicular Ad hoc Networks (VANETs) |
2020 IEEE 3rd International Conference on Information Communication and Signal Processing (ICICSP) |
2025-06-25 |
visibility
|
26 |
Techniques of Early Incident Detection and Traffic Monitoring Centre in VANETs: A Review. |
Journal of Communications |
2025-06-25 |
visibility
|
27 |
Performance Analysis of QoS in MANET based on IEEE 802.11 b |
2020 IEEE International Conference for Innovation in Technology (INOCON) |
2025-06-25 |
visibility
|
28 |
Proposed Efficient Conditional Privacy-Preserving Authentication Scheme for V2V and V2I Communications Based on Elliptic Curve Cryptography in Vehicular Ad Hoc Networks |
International Conference on Advances in Cyber Security |
2025-06-25 |
visibility
|
29 |
ID-PPA: Robust identity-based privacy-preserving authentication scheme for a vehicular ad-hoc network |
International Conference on Advances in Cyber Security |
2025-06-25 |
visibility
|
30 |
A comprehensive survey on vehicular ad hoc networks (vanets) |
2021 International Conference on Advanced Computer Applications (ACA) |
2025-06-25 |
visibility
|
31 |
Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks |
IEEE Access |
2025-06-25 |
visibility
|
32 |
Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks |
Applied Sciences |
2025-06-25 |
visibility
|
33 |
Deep learning based network intrusion detection for unmanned aerial vehicle (uav) |
2024 7th World Conference on Computing and Communication Technologies (WCCCT) |
2025-06-25 |
visibility
|