A SECURE AUTHENTICATION PROTOCOL FOR INTERNET OF VEHICLES

A Secure Authentication Protocol for Internet of Vehicles

An Internet of Vehicles (IoV) allows forming a self-organized network and broadcasting messages for the vehicles on roads.However, as the data are transmitted in an insecure network, it is essential to use an authentication mechanism to protect the privacy of vehicle users.Recently, Ying et al.proposed an authentication protocol for IoV and claimed

read more

An Analysis of the Identity of Idols in Phrygian Culture

Derived from the Greek -eidolon and the Latin -idolum, idols, meaning image or visual, stretching back to the Prehistoric Period, are schematized abstract depictions that have found themselves a place within different cultures during different periods, are thought to depict a god or goddess, and generally show a head and body, sometimes with a neck

read more


On a nonlinear system of plate equations with variable exponent nonlinearity and logarithmic source terms: Existence and stability results

In this paper, we consider a coupling non-linear system of two plate equations with logarithmic source terms.First, we study the local existence of solutions of the system using the Faedo-Galerkin method and Banach fixed point theorem.Second, we prove the global existence of Cutlery:Kitchen solutions of the system by using the potential wells.Final

read more

The impact of supply chain operational capability on business performance: Empirical finding from small and medium enterprises in Yogyakarta

This study aimed to analyze the effect of supply chain capability on business performance of small and medium enterprises (SMEs) in Yogyakarta.Supply chain capability is the ability to coordinate activities related to the flow of materials and products, both of which are within the organization and between organizations.Supply chain operational cap

read more