Code to analyze and visualize the communication overhead of seven different privacy-preserving schemes, as presented in our paper

The complete source files for this analysis, including the NS-3 simulation script, the generated dataset, and the Python analysis notebook, are available for download. This allows for full reproduction of our results. You can access all the project files [in our shared folder here].

Comments

Popular posts from this blog

From DSRC to 5G NR-V2X: The Road Ahead for Connected Vehicles

CTE 125 - COMPUTER WORKSHOP PRACTICE: WEEK ONE

Location_Privacy_for_IoV (Estimation of communication overhead incurred during IT request, ZKP validation, and blockchain logging)