835 results on '"Lee, Cheng-Chi"'
Search Results
2. Trust-Based Energy Efficient Protocol Over MANET Using PTORA and RRFO
3. A secure authenticated semi-quantum key distribution scheme for semi-quantum environments
4. Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for Internet of Drones
5. Accelerating QKD post-processing by secure offloading of information reconciliation
6. The impact of tumor resection on survival and functional outcomes for patients with primary central nervous system lymphoma
7. Prognostic significance of perioperative circulating CD56bright NK cell and recovery of NK cell activity in patients with colorectal cancer undergoing radical surgery
8. Focused ultrasound combined with radiotherapy for malignant brain tumor: a preclinical and clinical study
9. Machine learning assisted snort and zeek in detecting DDoS attacks in software-defined networking
10. Long-term follow-up and comparison of programmable and non-programmable ventricular cerebrospinal fluid shunts among adult patients with different hydrocephalus etiologies: a retrospective cohort study
11. Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network
12. Correlation between initial tumor enlargement and magnetic resonance imaging characteristics following linear accelerator-based stereotactic radiosurgery for acoustic neuromas
13. Module lattice based post quantum secure blockchain empowered vehicle to vehicle communication in the internet of vehicles
14. Correction to: Focused ultrasound combined with radiotherapy for malignant brain tumor: a preclinical and clinical study
15. Rathke’s cleft cyst classification and outcomes after endoscopic endonasal approach
16. Using a continuous electrocardiographic patch with heart rhythm analysis in the subacute stage of aneurysmal subarachnoid hemorrhage: The feasibility verification
17. An improved user authentication and key agreement scheme for roaming service in ubiquitous network
18. The Prognostic Impacts of Body Mass Index and Distance to the Peritoneal Bottom on Laparoscopic Ventriculoperitoneal Shunt Placement
19. An efficient cluster head selection for wireless sensor network-based smart agriculture systems
20. Blockchain-Enabled Mitigation Strategies for Distributed Denial of Service Attacks in IoT Sensor Networks: An Experimental Approach.
21. Next-Generation Block Ciphers: Achieving Superior Memory Efficiency and Cryptographic Robustness for IoT Devices.
22. Novel Fuzzy Ostrowski Integral Inequalities for Convex Fuzzy-Valued Mappings over a Harmonic Convex Set: Extending Real-Valued Intervals Without the Sugeno Integrals.
23. Novel 1,8-Naphthalimide Derivatives Inhibit Growth and Induce Apoptosis in Human Glioblastoma.
24. Predictive Value of Swab Cultures for Cryopreserved Flaps During Delayed Cranioplasties
25. AutoML-ID: automated machine learning model for intrusion detection using wireless sensor network
26. Verification of the critical-care pain observation tool in conscious patients with hemiparesis or cognitive dysfunction
27. Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function
28. Clinical outcomes of fractionated stereotactic radiosurgery in treating perioptic meningiomas and schwannomas: A single-institutional experience
29. The Impact of Tumor Resection on Survival and Functional Outcomes for Patients with Primary Central Nervous System Lymphoma
30. Recognition of High-Grade Invasiveness and Achievement of Gross Total Resection via an Endoscopic Endonasal Transsphenoidal Approach Promise Favorable Outcomes in Growth Hormone Pituitary Adenomas: 16 Years of Experience in a Single Institute
31. On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications
32. An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
33. Different causes and diverse outcomes of extremely rare septic cavernous sinus thrombosis complicated with internal carotid artery stenosis
34. A novel group ownership transfer protocol for RFID systems
35. Security enhancement on an RFID ownership transfer protocol based on cloud
36. Minimally invasive endoscopic evacuation with the novel, portable Axonpen neuroendoscopic system for spontaneous intracerebral hemorrhage
37. Deep Transfer Learning Models for Mobile-Based Ocular Disorder Identification on Retinal Images.
38. Neuropsychological performances in patients with infiltrative non-GBM gliomas after postoperative adjuvant photon or proton radiotherapy: A prospective and preliminary investigation.
39. A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System
40. An improved E-DRM scheme for mobile environments
41. Anterior Skull Base Tumor Resection by Transciliary Supraorbital Keyhole Craniotomy: A Single Institutional Experience
42. Seizures in surgically resected atypical and malignant meningiomas: Long-term outcome analysis
43. An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
44. A Novel Group Ownership Delegate Protocol for RFID Systems
45. An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
46. Awake craniotomies for epileptic gliomas: intraoperative and postoperative seizure control and prognostic factors
47. Cryptanalysis of 'An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System'
48. Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems
49. Privacy-Preserving Techniques in Cloud/Fog and Internet of Things
50. Machine learning assisted snort and zeek in detecting DDoS attacks in software-defined networking
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.