-
Article
A message transmission scheduling algorithm based on time-domain interference alignment in UWANs
High propagation delays cause message collisions at intended nodes, which seriously affects network performance. In this paper, we consider the transmission scheduling problem of messages with specified transm...
-
Chapter and Conference Paper
Memory Confidentiality and Integrity Protection Technology
In most existing computer systems, data transmission and preservation in the form of plaintext are vulnerable to various attacks. In this paper, we use Parralelized memory Confidentiality and Integrity Protect...
-
Article
A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs
Location privacy plays an important role in Vehicular Ad Hoc Networks (VANETs). Pseudonym is normally used to preserve location privacy, which can meet the requirements of both privacy and security. When the s...