Search

Your search keyword '"*SCHEME programming language"' showing total 51 results

Search Constraints

Start Over You searched for: Descriptor "*SCHEME programming language" Remove constraint Descriptor: "*SCHEME programming language" Journal information sciences Remove constraint Journal: information sciences
51 results on '"*SCHEME programming language"'

Search Results

1. Communication-efficient outsourced privacy-preserving classification service using trusted processor.

2. Attention pooling-based convolutional neural network for sentence modelling.

3. Self-embedding fragile watermarking based on reference-data interleaving and adaptive selection of embedding mode.

4. Semi-generic construction of public key encryption and identity-based encryption with equality test.

5. Event-driven multi-consensus of multi-agent networks with repulsive links.

6. Realizing secret sharing with general access structure.

7. Strongly secure identity-based authenticated key agreement protocols without bilinear pairings.

8. Accountable mobile E-commerce scheme via identity-based plaintext-checkable encryption.

9. A measurement-based control design approach for efficient cancer chemotherapy.

10. A computational approach to the continuous authentication biometric system.

11. Notes on the security of certificateless aggregate signature schemes.

12. Learning the object location, scale and view for image categorization with adapted classifier.

13. PSD: Practical Sybil detection schemes using stickiness and persistence in online recommender systems.

14. On delegatability of designated verifier signature schemes.

15. Cryptanalysis of a key exchange scheme based on block matrices.

16. Notes on a group-oriented setting’s multisigncryption scheme with threshold designcryption.

17. Oriented edge-selective band-pass filtering.

18. An identity-based strongly unforgeable signature without random oracles from bilinear pairings.

19. Certificateless proxy multi-signature.

20. Ciphertext-policy hierarchical attribute-based encryption with short ciphertexts.

21. A communication-efficient private matching scheme in Client–Server model.

22. An enhanced (t,n) threshold directed signature scheme.

23. Attribute-based key-insulated signature and its applications.

24. Oppositional extension of reinforcement learning techniques.

25. Signatures in hierarchical certificateless cryptography: Efficient constructions and provable security.

26. On character-based index schemes for complex wildcard search in peer-to-peer networks.

27. New extended visual cryptography schemes with clearer shadow images.

28. Identity-based chameleon hashing and signatures without key exposure.

29. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment.

30. Adaptability, interpretability and rule weights in fuzzy rule-based systems.

31. Iterative meta-clustering through granular hierarchy of supermarket customers and products.

32. Provably secure certificate-based signature scheme without pairings

33. On security of a certificateless signcryption scheme

34. Fully secure hidden vector encryption under standard assumptions

35. Cryptanalysis of Álvarez et al. key exchange scheme

36. Adaptive population tuning scheme for differential evolution

37. Group signatures with controllable linkability for dynamic membership

38. Improved cryptanalysis of a knapsack-based probabilistic encryption scheme

39. Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption

40. MUD: Mapping-based query processing for high-dimensional uncertain data

41. Integration of a secure type-2 fuzzy ontology with a multi-agent platform: A proposal to automate the personalized flight ticket booking domain

42. An improved shuffled frog-leaping algorithm with extremal optimisation for continuous optimisation

43. An application of swarm intelligence to distributed image retrieval

44. Optimizing least-significant-bit substitution using cat swarm optimization strategy

45. Cryptanalysis of a certificateless signcryption scheme in the standard model

46. Forward-secure identity-based signature: Security notions and construction

47. Perceptually adaptive spread transform image watermarking scheme using Hadamard transform

48. Signcryption from randomness recoverable public key encryption

49. Efficient threshold proxy signature protocol for mobile agents

50. Output feedback LMI tracking control conditions with H ∞ criterion for uncertain and disturbed T–S models

Catalog

Books, media, physical & digital resources