Skip to main content

and
  1. No Access

    Article

    A message transmission scheduling algorithm based on time-domain interference alignment in UWANs

    High propagation delays cause message collisions at intended nodes, which seriously affects network performance. In this paper, we consider the transmission scheduling problem of messages with specified transm...

    Nan Zhao, Nianmin Yao, Zhenguo Gao in Peer-to-Peer Networking and Applications (2021)

  2. No Access

    Chapter and Conference Paper

    Memory Confidentiality and Integrity Protection Technology

    In most existing computer systems, data transmission and preservation in the form of plaintext are vulnerable to various attacks. In this paper, we use Parralelized memory Confidentiality and Integrity Protect...

    Hong** Wang, Huimin Meng, Nianmin Yao in Communications, Signal Processing, and Sys… (2020)

  3. No Access

    Article

    A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs

    Location privacy plays an important role in Vehicular Ad Hoc Networks (VANETs). Pseudonym is normally used to preserve location privacy, which can meet the requirements of both privacy and security. When the s...

    Shibin Wang, Nianmin Yao, Ning Gong in Peer-to-Peer Networking and Applications (2018)