Now showing items 1-3 of 3
Use Of Smartphones for Ensuring Vulnerable Road User Safety through Path Prediction and Early Warning: An In-Depth Review of Capabilities, Limitations and Their Applications in Cooperative Intelligent Transport Systems
The field of cooperative intelligent transport systems and more specifically pedestrians to vehicles could be characterized as quite challenging, since there is a broad research area to be studied, with direct positive ...
On the Conference Key Distribution System with User Anonymity
Conference Key Distribution Systems (CKDS) are well-analyzed systems for the computation and distribution of a symmetric key shared amongst a session's participants. We focus on previous CKDS with user anonymity and we ...
A Holistic Cybersecurity Maturity Assessment Framework for Higher Education Institutions in the United Kingdom
As organisations are vulnerable to cyber attacks, their protection becomes a significant issue. Capability Maturity Models can enable organisations to benchmark current maturity levels against best practices. Although many ...