1,123 results on '"Maode Ma"'
Search Results
202. An efficient authentication framework over heterogeneous vehicular networks.
203. Delay efficient software defined networking based architecture for vehicular networks.
204. Reference broadcast synchronization scheme for nanomachines.
205. A unified grid-based wandering pattern detection algorithm.
206. A PMIPv6-Based Secured Mobility Scheme for 6LoWPAN.
207. Offset estimation for clock synchronization in mobile molecular communication system.
208. Parameter estimation of inverse Gaussian channel for diffusion-based molecular communication.
209. Fast and efficient physical layer authentication for 5G HetNet handover.
210. A proxy signature-based handover authentication scheme for LTE wireless networks.
211. Design of a novel dynamic trust model for spectrum management in WRANs of TV white space.
212. Optimal Relay Node Placement and Flow Allocation in Underwater Acoustic Sensor Networks.
213. Bitstream-Oriented Protection for the H.264/Scalable Video Coding (SVC).
214. Resource Matching in Carrier Aggregation Enabling 5G Networks.
215. A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks.
216. A Novel Energy Efficient Key Distribution Scheme for Mobile WiMAX Networks.
217. Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm.
218. Near-Optimal Cross-Layer Forward Error Correction Using Raptor and RCPC Codes for Prioritized Video Transmission Over Wireless Channels.
219. Time Synchronization for Molecular Communication With Drift.
220. G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks.
221. Resource management for symmetrical applications over heterogeneous services in IEEE 802.16.
222. An anonymous authentication scheme for multi-domain machine-to-machine communication in cyber-physical systems.
223. Offset and Skew Estimation for Clock Synchronization in Molecular Communication Systems.
224. Pareto efficient resource matching for LTE-A system.
225. Effect of coupling capacitance in voltage multiplier design optimization for RF energy harvesting.
226. Neighborhood area network security in smart grid using security enhanced key updating.
227. Provable secure protected designated proxy signature with revocation.
228. An Authentication Framework for Multi-Domain Machine-to-Machine Communication in Cyber-Physical Systems.
229. A Lightweight Secure VANET-Based Navigation System.
230. Perceptive Forwarding Strategy in Content-Centric Network.
231. UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks.
232. GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks.
233. An authentication and key establishment scheme to enhance security for M2M in 6LoWPANs.
234. TR-SDTN: Trust based efficient routing in hostile social DTNs.
235. Secure Public Key Regime (SPKR) in vehicular networks.
236. A lightweight and secure handover authentication scheme for 5G network using neighbour base stations.
237. An enhanced handover authentication solution for 6LoWPAN networks.
238. A lightweight traceable D2D authentication and key agreement scheme in 5G cellular networks.
239. LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks.
240. Semantic Searchable Encryption Scheme Based on Lattice in Quantum-Era.
241. Efficient Deployment of Base Stations in Wireless Communication Networks.
242. A Load Balance Mechanism in Heterogeneous Network Based on Utility Function.
243. Study of Constellation Design of Pseudolites Based on Improved Adaptive Genetic Algorithm.
244. Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds.
245. A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN Networks.
246. Two-stage frequency-domain oversampling receivers for cyclic prefix orthogonal frequency-division multiplexing systems.
247. A symmetric key-based pre-authentication protocol for secure handover in mobile WiMAX networks.
248. Secure delegation of services through proxy signature with revocation.
249. H-LCFST: a hash lowest cost first search tree for flexible packet classification.
250. An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.