Abstract: The widespread use of the internet has led to frequent cryptographic attack event incidents, which pose various risks, including the leakage of personal information, privacy data, identity ...
Abstract: With the emergence of computing-intensive vehicular applications, limited on-board computing resources become insufficient to meet the computing requirement of many vehicular applications.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results