Cloud and IoT‐Based Vehicular Ad Hoc Networks 2021
DOI: 10.1002/9781119761846.ch13
|View full text |Cite
|
Sign up to set email alerts
|

Role of Machine Learning for Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 36 publications
0
0
0
Order By: Relevance
“…The movement in, November 2013 introduces "conditional encryption," first seen internationally. The current scenarios are learning a new approach called "perfectly unconditional hiding," recently proposed by Wang et al constructions without the use of error-correcting subsystems (CTE) (BQSM) [47]- [52]. This model postulates that the quantity of data an adversary can store has a known upper limit, the Q limit.…”
Section: A Quantum Computing and Real Time Cryptographymentioning
confidence: 99%
“…The movement in, November 2013 introduces "conditional encryption," first seen internationally. The current scenarios are learning a new approach called "perfectly unconditional hiding," recently proposed by Wang et al constructions without the use of error-correcting subsystems (CTE) (BQSM) [47]- [52]. This model postulates that the quantity of data an adversary can store has a known upper limit, the Q limit.…”
Section: A Quantum Computing and Real Time Cryptographymentioning
confidence: 99%