Search

Your search keyword '"Chen, Hsiao-Hwa"' showing total 25 results

Search Constraints

Start Over You searched for: Author "Chen, Hsiao-Hwa" Remove constraint Author: "Chen, Hsiao-Hwa" Topic security Remove constraint Topic: security
25 results on '"Chen, Hsiao-Hwa"'

Search Results

2. Artificial Noise Assisted Secure Mobile Crowd Computing in Intelligently Connected Vehicular Networks.

3. 6G Cellular Networks and Connected Autonomous Vehicles.

4. How Much Can Radio Resource Allocation Help to Improve Secrecy Capacity of V2V Underlay Cellular Networks?

5. Physical Layer Security in Intelligently Connected Vehicle Networks.

6. Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA.

7. Energy Big Data Security Threats in IoT-Based Smart Grid Communications.

8. Secrecy wireless information and power transfer: challenges and opportunities.

9. An Event-Based Unified System Model to Characterize and Evaluate Timing Covert Channels.

10. Physical Layer Security in Multi-Cell MISO Downlinks With Incomplete CSI—A Unified Secrecy Performance Analysis.

11. Intrusion Detection in Cyber-Physical Systems: Techniques and Challenges.

12. Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks.

13. Assurance of Energy Efficiency and Data Security for ECG Transmission in BASNs.

14. Secure Stochastic ECG Signals Based on Gaussian Mixture Model for e-Healthcare Systems.

15. An effective key management scheme for heterogeneous sensor networks.

16. Security and Privacy in Wireless IoT.

17. A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network

18. Selective Regression Test for Access Control System Employing RBAC

19. Fault Tolerant Secure Routing in Cluster Based Mobile Sensor Networks

20. Authenticated Encryption in WSN Using eSTREAM Ciphers

21. A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks

22. Protecting Global SOA from DoS and Other Security Threats

23. Performance Analysis of Digital Secure Voice Transmission over HF Radio Channel

24. Signaling-Oriented DoS Attacks in UMTS Networks

25. Security Evaluation of an Intrusion Tolerant Web Service Architecture Using Stochastic Activity Networks

Catalog

Books, media, physical & digital resources