
- [1] . 2023. Improving security of internet of vehicles based on post- quantum signatures with systolic divisions. ACM TOIT (2023).Google Scholar
- [2] . 2023. Efficient cryptographic hardware for safety message verification in internet of connected vehicles. ACM TOIT. (2023).Google Scholar
- [3] . 2023. Token-based authorization and authentication for secure internet of vehicles communication. ACM TOIT. (2023).Google Scholar
- [4] . 2023. Driver identification using optimized deep learning model in smart transportation. ACM TOIT. (2023).Google Scholar
- [5] . 2023. Pedestrian trajectory prediction using facial keypoints based convolutional encoder-decoder network. ACM TOIT. (2023).Google Scholar
- [6] . 2023. Identity-based public auditing for cloud storage of internet-of-vehicles data. ACM TOIT. (2023).Google Scholar
- [7] . 2023. Deep learning-based network traffic prediction for secure backbone networks in internet of vehicles. ACM TOIT. (2023).Google Scholar
- [8] . 2023. CARES: Context-aware trust estimation for realtime crowdsensing services in vehicular edge networks. ACM TOIT. (2023).Google Scholar
- [9] . 2023. Providing reliable service for parked-vehicle-assisted mobile edge computing. ACM TOIT. (2023).Google Scholar
- [10] . 2023. Tripartite transmitting methodology for intermittently connected mobile network (ICMN). ACM TOIT. (2023).Google Scholar
- [11] . 2023. PPRP: Preserving-Privacy route planning scheme in VANETs. ACM TOIT. (2023).Google Scholar
Index Terms
(auto-classified)Introduction to the Special Section on Cyber Security in Internet of Vehicles
Recommendations
Internet of Things security
The Internet of things (IoT) has recently become an important research topic because it integrates various sensors and objects to communicate directly with one another without human intervention. The requirements for the large-scale deployment of the ...
Cyber security framework for Internet of Things-based Energy Internet
AbstractWith the significant improvement in deployment of Internet of Things (IoT) into the smart grid infrastructure, the demand for cyber security is rapidly growing. The Energy Internet (EI) also known as the integrated internet-based smart ...
Highlights- The security and privacy of components, data and events in the Energy Internet.
Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges
Internet of Things-based environments pose various challenges due to their anytime/anywhere computing, and the efficient cryptographic based key management is one of the major challenges in Internet of Things. The key management life cycle consists of ...






Comments