We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 10,000 results
  1. Particle swarm optimization-based energy efficient clustering protocol in wireless sensor network

    The nodes in the wireless sensor network are furnished with restricted and irreplaceable battery power. The continuous sensing, computation, and...

    Piyush Rawat, Siddhartha Chauhan in Neural Computing and Applications
    Article 09 May 2021
  2. Conclave: A Collective Stake Pool Protocol

    Proof-of-Stake (PoS) distributed ledgers are the most common alternative to Bitcoin’s Proof-of-Work (PoW) paradigm, replacing the hardware dependency...
    Dimitris Karakostas, Aggelos Kiayias, Mario Larangeira in Computer Security – ESORICS 2021
    Conference paper 2021
  3. Proving Mutual Authentication Property of 5G-AKA Protocol Based on PCL

    The authentication function of the mobile network is the foundation to ensure the legitimacy of the network and user identities and provide security...
    Tong Zhang, Meihua **ao, Ri Ouyang in Theoretical Computer Science
    Conference paper 2021
  4. Learning-Based Evaluation of Routing Protocol in Vehicular Network Using WEKA

    Internet of things connects any object to another and communicate with them using the most performed routing protocol. But in vehicular networks,...
    Amal Hadrich, Amel Meddeb Makhlouf, Faouzi Zarai in Network and Parallel Computing
    Conference paper 2021
  5. A Compressed \(\varSigma \) -Protocol Theory for Lattices

    We show a lattice-based solution for commit-and-prove transparent circuit zero-knowledge (ZK) with polylog-communication, the first not depending on...
    Thomas Attema, Ronald Cramer, Lisa Kohl in Advances in Cryptology – CRYPTO 2021
    Conference paper 2021
  6. Population-induced phase transitions and the verification of chemical reaction networks

    We show that very simple molecular systems, modeled as chemical reaction networks, can have behaviors that exhibit dramatic phase transitions at...

    James I. Lathrop, Jack H. Lutz, ... Matthew R. Riley in Natural Computing
    Article 17 November 2021
  7. A Secure and Stable Routing Protocol for VANET Under Malicious Attacks

    Changing over digital age is becoming the driving force for modern approaches to provide a safe road system. Vehicular ad hoc networks (VANETs) are...
    Amani A. Sabbagh, Maxim V. Shcherbakov in Creativity in Intelligent Technologies and Data Science
    Conference paper 2021
  8. Studying Urban Space from Textual Data: Toward a Methodological Protocol to Extract Geographic Knowledge from Real Estate Ads

    Real estate ads are a rich source of information when studying social representation of residential space. However, extracting knowledge from them...
    Alicia Blanchi, Giovanni Fusco, ... Lucie Cadorel in Computational Science and Its Applications – ICCSA 2022 Workshops
    Conference paper 2022
  9. An analysis of the effects of territory properties on population behaviors and evacuation management during disasters using coupled dynamical systems

    One of the major current challenges in the field of security and safety of populations is to advance further in the understanding and the ability to...

    Valentina Lanza, Edwige Dubos-Paillard, ... Alexandre Berred in Applied Network Science
    Article Open access 19 March 2022
  10. Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach

    In this paper, we propose a privacy-preserving contact tracing protocol for smart phones, and more specifically Android and iOS phones. The protocol...
    Joseph K. Liu, Man Ho Au, ... Kim-Kwang Raymond Choo in Information Security Practice and Experience
    Conference paper 2021
  11. Cybersecurity Analysis in Nodes that Work on the DICOM Protocol, a Case Study

    Currently the Internet is the main tool for interconnection of systems and data processing, SCADA systems, marketing, government; Even medical...
    Conference paper 2021
  12. Hierarchical clustering and routing protocol to ensure scalability and reliability in large-scale wireless sensor networks

    Cluster-based routing protocols have been proven efficient in prolonging the life cycle of wireless sensor networks (WSNs). Periodic and multi-hop...

    Harmanpreet Singh, Damanpreet Singh in The Journal of Supercomputing
    Article 26 February 2021
  13. A Secure Bio-Hash–Based Multiparty Mutual Authentication Protocol for Remote Health Monitoring Applications

    Remote health monitoring can benefit a large number of stake holders in healthcare industry, and it has the potential to make healthcare facilities...
    Chapter 2021
  14. Landcoin: A Practical Protocol for Transfer-of-Asset

    Blockchains ensure integrity, transparency, and immutability of transactions they process. It also guarantees the eventual inclusion of all the...
    Vishwas Patil, R. K. Shyamasundar in Information Systems Security
    Conference paper 2021
  15. Energy efficient clustering routing protocol using novel admission allotment scheme (AAS) based intra-cluster communication for Wireless Sensor Network

    The Wireless Sensor Network (WSN) is used in a variety of industrial, commercial and social applications. WSN clustering is a cost-effective method...

    Mohammed Shahid Thekiya, Mangesh Dindayal Nikose in International Journal of Information Technology
    Article 01 September 2022
  16. Fractional-social ski driver optimization-driven routing protocol for routing electric vehicle under server hosted VANET

    The modernization in Electric Vehicles (EVs) has acquired immense interest amongst several researchers as the EV is termed a supreme mode of...

    Shivanand C. Hiremath, Jayashree D. Mallapur in Multimedia Tools and Applications
    Article 07 March 2022
  17. The Power of Global Knowledge on Self-stabilizing Population Protocols

    In the population protocol model, many problems cannot be solved in a self-stabilizing way. However, global knowledge, such as the number of nodes in...
    Yuichi Sudo, Masahiro Shibata, ... Toshimitsu Masuzawa in Structural Information and Communication Complexity
    Conference paper 2020
  18. Ergonomic Risk Assessment in Kerbside Waste Collection Through Dynamic REBA Protocol

    Literature shows that biomechanical risk in kerbside waste collection is high and widespread. The different work environments and working conditions...
    Alessio Silvetti, Lorenzo Fiori, ... Francesco Draicchio in Proceedings of the 21st Congress of the International Ergonomics Association (IEA 2021)
    Conference paper 2021
  19. QRP: QPSO Based Routing Protocol for Energy Efficiency in Wireless Body Area Networks

    In contemporary times, Wireless Body Area Networks has arisen as a new area for tracking, identification, examining and treatment of multiple deadly...
    Conference paper 2021
  20. Time-Optimal Self-stabilizing Leader Election on Rings in Population Protocols

    We propose a self-stabilizing leader election protocol on directed rings in the model of population protocols. Given an upper bound N on the...
    Daisuke Yokota, Yuichi Sudo, Toshimitsu Masuzawa in Stabilization, Safety, and Security of Distributed Systems
    Conference paper 2020
Did you find what you were looking for? Share feedback.