The 5G vehicle-to-everything (V2X) communication for autonomous and
semi...
Wireless Mesh Networks (WMNs) have emerged as a key technology for the n...
Trust models that rely on recommendation trusts are vulnerable to badmou...
Public key infrastructure (PKI) is the most widely used security mechani...
Content distribution is one of the most popular applications in intellig...