Search

Showing total 22 results
22 results

Search Results

1. Optimization of handoff for joint uplink base station association and power control with max‐min fairness in NOMA small‐cell networks.

2. Deep Learning System for User Identification Using Sensors on Doorknobs.

3. Privacy information protection of medical internet based on double chaos encryption algorithm.

4. An image partition security-sharing mechanism based on blockchain and chaotic encryption.

5. A Novel IDS with a Dynamic Access Control Algorithm to Detect and Defend Intrusion at IoT Nodes.

6. A Self-Localization Algorithm for Mobile Targets in Indoor Wireless Sensor Networks Using Wake-Up Media Access Control Protocol.

7. Disabling Tracing in Black-Box-Traceable CP-ABE System: Alert Decryption Black Box.

8. Dynamic-Distance-Based Thresholding for UAV-Based Face Verification Algorithms.

9. Adaptively secure CP-ABE for circuits with fan-in n and fan-out 1.

10. A fusion data security protection scheme for sensitive E-documents in the open network environment.

11. Energy-Aware Medium Access Control Protocol and Clustering Algorithm for Clustered Wireless Sensor Networks with High Altitude Platforms as the Base Station.

12. A Momentum-Based Local Face Adversarial Example Generation Algorithm.

13. Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm.

14. CPACK: An Intelligent Cyber-Physical Access Control Kit for Protecting Network †.

15. Multi-keyword ranked search with access control for multiple data owners in the cloud.

16. An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud.

17. Application of a secure data transmission with an effective timing algorithm based on LoRa modulation and chaos.

18. 2D2PS: A demand-driven privacy-preserving scheme for anonymous data sharing in smart grids.

19. A survey on Attribute-Based Signatures.

20. Privacy-preserving credit evaluation system based on blockchain.

21. Sliding Group Window with Rebacking off for Collision Avoidance in High-Efficiency Wireless Networks.

22. Consistency checking of STNs with decisions: Managing temporal and access-control constraints in a seamless way.