In this paper, we will focus on the security of advanced metering infrastructure (AMI), which is one of the most…
This paper presents a systematic data-driven approach to assisting situational application development. We first propose a technique to extract useful…
Data Collection in Multi-Application SharingWireless Sensor NetworksHong Gao, Xiaolin Fang, Jianzhong Li, and Yingshu LiAbstract—Data sharing for data collection among…
Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenishable energy resources. In…
This paper presents a new approach to index color images using the features extracted from the error diffusion block truncation…
INTRODUCTIONOver the past few years, anywhere, anytime wirelessconnectivity has gradually become a realityand has resulted in remarkably increased mobiletraffic. Mobile…
Authenticated Key Exchange Protocols for ParallelNetwork File SystemsHoon Wei Lim Guomin YangAbstract—We study the problem of key establishment for securemany-to-many…
AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF THINGS ABSTRACT: The Internet of Things (IoT) is becoming an attractive…
1.1 ABSTRACT: Big sensor data is prevalent in both industry and scientific research applications where the data is generated with…
1.1 ABSTRACT: Characterized by the increasing arrival rate of live content, the emergency applications pose a great challenge: how to…