Cargando…
Security Requirements and Challenges of 6G Technologies and Applications
After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-connectivity between people and everything. In add...
Autores principales: | Abdel Hakeem, Shimaa A., Hussein, Hanan H., Kim, HyungWon |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8914636/ https://www.ncbi.nlm.nih.gov/pubmed/35271113 http://dx.doi.org/10.3390/s22051969 |
Ejemplares similares
-
Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X
por: Hakeem, Shimaa A. Abdel, et al.
Publicado: (2021) -
Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography
por: Hakeem, Shimaa A. Abdel, et al.
Publicado: (2020) -
A Key Management Protocol Based on the Hash Chain Key Generation for Securing LoRaWAN Networks
por: Hakeem, Shimaa A. Abdel, et al.
Publicado: (2021) -
Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication
por: Abdel Hakeem, Shimaa A., et al.
Publicado: (2022) -
A Scalable and Secure Group Key Management Method for Secure V2V Communication
por: Aliev, Hayotjon, et al.
Publicado: (2020)