Search
Now showing items 11-15 of 15
Trustworthy Users: Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes
(MDPI, 2023-03-10)
Attribute spoofing is a major security threat in information exchange solutions based on Ciphertext-Policy Attribute-Based-Encryption (CP-ABE) and distributed CP-ABE (dCP-ABE), which can compromise privacy and security. ...
An architecture for dynamic QoS management at Layer 2 for DOCSIS access networks using OpenFlow
(Elsevier, 2016-01-15)
Over the last few years, Software-Defined Networking (SDN) has emerged as one of the most disruptive and profitable novelties in networking. SDN was originally conceived to improve performance and reduce costs in Ethernet-based ...
The cross layer RMPA handover: a reliable mobility pattern aware handover strategy for broadband wireless communication in a high-speed railway domain
(Springer, 2012)
Enhancing the handover process in broadband wireless communication deployment has traditionally motivated many research initiatives. In a high-speed railway domain, the challenge is even greater. Owing to the long distances ...
Analytical efficiency evaluation of a network mobility management protocol for Intelligent Transportation Systems
(Springer, 2012)
One of the major concerns in an Intelligent Transportation System (ITS) scenario, such as that which may be found on a long-distance train service, is the provision of efficient communication services, satisfying users' ...
Improving efficiency and security of IIoT communications using in-network validation of server certificate
(Elsevier, 2023-01)
The use of advanced communications and smart mechanisms in industry is growing rapidly, making cybersecurity a critical aspect. Currently, most industrial communication protocols rely on the Transport Layer Security (TLS) ...