A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box | 0 | 0.34 | 2022 |
Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems | 0 | 0.34 | 2022 |
An Explainable Diagnostic Method For Autism Spectrum Disorder Using Neural Network | 0 | 0.34 | 2021 |
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network | 1 | 0.35 | 2021 |
Privacy-preserving Diverse Keyword Search and Online Pre-diagnosis in Cloud Computing | 0 | 0.34 | 2021 |
(t, k, n) XOR-based visual cryptography scheme with essential shadows | 0 | 0.34 | 2020 |
Research on Remaining Useful Life Prediction of Rolling Element Bearings Based on Time-Varying Kalman Filter | 2 | 0.38 | 2020 |
A Construction Method of (2, 3) Visual Cryptography Scheme | 1 | 0.36 | 2020 |
FEM assessment of the effects of machining parameters in vibration assisted nano impact machining of silicon by loose abrasives. | 0 | 0.34 | 2020 |
Cheating Detection in (k, n) Secret Image Sharing Scheme. | 0 | 0.34 | 2019 |
A Topology Based Differential Privacy Scheme for Average Path Length Query | 0 | 0.34 | 2019 |
一种面向二进制的细粒度控制流完整性方法 (Fine-grained Control Flow Integrity Method on Binaries). | 0 | 0.34 | 2019 |
Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System. | 1 | 0.34 | 2019 |
Lightweight Security Authentication Mechanism Towards UAV Networks | 1 | 0.35 | 2019 |
Challenges in Covert Wireless Communications with Active Warden on AWGN channels. | 0 | 0.34 | 2019 |
Publicly verifiable database scheme with efficient keyword search. | 6 | 0.42 | 2019 |
Covert Wireless Communications with Active Eavesdropper on AWGN Channels. | 0 | 0.34 | 2018 |
ProactiveCrowd: Modelling Proactive Steering Behaviours for Agent-Based Crowd Simulation. | 0 | 0.34 | 2018 |
The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty. | 2 | 0.37 | 2017 |
Test of Mechanical Failure for Via Holes and Solder Joints of Complex Interconnect Structure. | 1 | 0.38 | 2017 |
Time is What Prevents Everything from Happening at Once: Propagation Time-conscious Influence Maximization. | 0 | 0.34 | 2017 |
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks. | 29 | 0.75 | 2016 |
Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags | 0 | 0.34 | 2016 |
An approach to quality assessment for web service selection based on the analytic hierarchy process for cases of incomplete information | 0 | 0.34 | 2015 |
A collaborative self-governing privacy-preserving wireless sensor network architecture based on location optimization for dynamic service discovery in MANET environment | 0 | 0.34 | 2015 |
Numerical investigation of restricted contact cutting tool in machining of AISI 1045 steel | 0 | 0.34 | 2015 |
A Security Quantitative Analysis Method For Access Control Based on Security Entropy. | 2 | 0.44 | 2015 |
Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles. | 0 | 0.34 | 2015 |
基于离散Hermite多项式的图像压缩 (Image Compression Based on Discrete Hermite Polynomials). | 0 | 0.34 | 2015 |
Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al. | 25 | 0.66 | 2015 |
Improvement of robust smart-card-based password authentication scheme | 24 | 0.64 | 2015 |
Robust Two-Factor Authentication and Key Agreement Preserving User Privacy. | 0 | 0.34 | 2014 |
Measurement on the border effect of transboundary water resources: A case study of China's Zhanghe basin | 0 | 0.34 | 2014 |
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing | 0 | 0.34 | 2013 |
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency | 0 | 0.34 | 2013 |
Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks | 1 | 0.38 | 2013 |
Improving security and efficiency for multi-authority access control system in cloud storage. | 0 | 0.34 | 2013 |
Distributed Information Flow Verification Framework For The Composition Of Service Chain In Wireless Sensor Network | 4 | 0.40 | 2013 |
An novel three-party authenticated key exchange protocol using one-time key | 21 | 0.70 | 2013 |
A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation | 0 | 0.34 | 2012 |
Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs | 0 | 0.34 | 2012 |
Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System | 0 | 0.34 | 2012 |
Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols. | 12 | 0.70 | 2012 |
Secrecy Transfer. | 0 | 0.34 | 2012 |
AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework | 2 | 0.48 | 2011 |
Cryptanalysis of a Privacy-Preserving Communication Architecture for V2G Networks in Smart Grid. | 0 | 0.34 | 2011 |
Game-theoretic analyses and simulations of adoptions of security policies for DRM in contents sharing scenario | 1 | 0.35 | 2011 |
A New Evaluation Model for Security Protocols. | 1 | 0.37 | 2011 |
Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks | 0 | 0.34 | 2010 |
Efficient and Identity-based Signcryption with Provably-secure | 0 | 0.34 | 2010 |