Search
Search Results
-
Particle swarm optimization-based energy efficient clustering protocol in wireless sensor network
The nodes in the wireless sensor network are furnished with restricted and irreplaceable battery power. The continuous sensing, computation, and...
-
Conclave: A Collective Stake Pool Protocol
Proof-of-Stake (PoS) distributed ledgers are the most common alternative to Bitcoin’s Proof-of-Work (PoW) paradigm, replacing the hardware dependency... -
Proving Mutual Authentication Property of 5G-AKA Protocol Based on PCL
The authentication function of the mobile network is the foundation to ensure the legitimacy of the network and user identities and provide security... -
Learning-Based Evaluation of Routing Protocol in Vehicular Network Using WEKA
Internet of things connects any object to another and communicate with them using the most performed routing protocol. But in vehicular networks,... -
A Compressed \(\varSigma \) -Protocol Theory for Lattices
We show a lattice-based solution for commit-and-prove transparent circuit zero-knowledge (ZK) with polylog-communication, the first not depending on... -
Population-induced phase transitions and the verification of chemical reaction networks
We show that very simple molecular systems, modeled as chemical reaction networks, can have behaviors that exhibit dramatic phase transitions at...
-
A Secure and Stable Routing Protocol for VANET Under Malicious Attacks
Changing over digital age is becoming the driving force for modern approaches to provide a safe road system. Vehicular ad hoc networks (VANETs) are... -
Studying Urban Space from Textual Data: Toward a Methodological Protocol to Extract Geographic Knowledge from Real Estate Ads
Real estate ads are a rich source of information when studying social representation of residential space. However, extracting knowledge from them... -
An analysis of the effects of territory properties on population behaviors and evacuation management during disasters using coupled dynamical systems
One of the major current challenges in the field of security and safety of populations is to advance further in the understanding and the ability to...
-
Privacy-Preserving Contact Tracing Protocol for Mobile Devices: A Zero-Knowledge Proof Approach
In this paper, we propose a privacy-preserving contact tracing protocol for smart phones, and more specifically Android and iOS phones. The protocol... -
Cybersecurity Analysis in Nodes that Work on the DICOM Protocol, a Case Study
Currently the Internet is the main tool for interconnection of systems and data processing, SCADA systems, marketing, government; Even medical... -
Hierarchical clustering and routing protocol to ensure scalability and reliability in large-scale wireless sensor networks
Cluster-based routing protocols have been proven efficient in prolonging the life cycle of wireless sensor networks (WSNs). Periodic and multi-hop...
-
A Secure Bio-Hash–Based Multiparty Mutual Authentication Protocol for Remote Health Monitoring Applications
Remote health monitoring can benefit a large number of stake holders in healthcare industry, and it has the potential to make healthcare facilities... -
Landcoin: A Practical Protocol for Transfer-of-Asset
Blockchains ensure integrity, transparency, and immutability of transactions they process. It also guarantees the eventual inclusion of all the... -
Energy efficient clustering routing protocol using novel admission allotment scheme (AAS) based intra-cluster communication for Wireless Sensor Network
The Wireless Sensor Network (WSN) is used in a variety of industrial, commercial and social applications. WSN clustering is a cost-effective method...
-
Fractional-social ski driver optimization-driven routing protocol for routing electric vehicle under server hosted VANET
The modernization in Electric Vehicles (EVs) has acquired immense interest amongst several researchers as the EV is termed a supreme mode of...
-
The Power of Global Knowledge on Self-stabilizing Population Protocols
In the population protocol model, many problems cannot be solved in a self-stabilizing way. However, global knowledge, such as the number of nodes in... -
Ergonomic Risk Assessment in Kerbside Waste Collection Through Dynamic REBA Protocol
Literature shows that biomechanical risk in kerbside waste collection is high and widespread. The different work environments and working conditions... -
QRP: QPSO Based Routing Protocol for Energy Efficiency in Wireless Body Area Networks
In contemporary times, Wireless Body Area Networks has arisen as a new area for tracking, identification, examining and treatment of multiple deadly... -
Time-Optimal Self-stabilizing Leader Election on Rings in Population Protocols
We propose a self-stabilizing leader election protocol on directed rings in the model of population protocols. Given an upper bound N on the...