Lightweight Public Key Authenticated Encryption With Keyword Search Against Adaptively-Chosen-Targets Adversaries for Mobile Devices | 1 | 0.35 | 2022 |
Design and Implementation of "Winning Luding Bridge" Immersion FPS Game Based on Unity3D Technology. | 0 | 0.34 | 2021 |
Channel Modeling of BPLC at Customer Side Based on Parameter Estimation. | 0 | 0.34 | 2021 |
Research on Smart Agriculture IoT System Based Heterogeneous Networking Technology. | 0 | 0.34 | 2021 |
Detecting and Understanding Branching Frequency Changes in Process Models | 0 | 0.34 | 2021 |
Design and Implementation of "The Belt and Road Initiative" Immersive Interaction System Based on UE4+GIS Platform. | 0 | 0.34 | 2021 |
"Dawn of South Lake" - - Design and Implementation of Immersive Interactive System Based on Virtual Reality Technology. | 0 | 0.34 | 2021 |
Distributed safe reinforcement learning for multi-robot motion planning. | 0 | 0.34 | 2021 |
Short-Term Power Load Probability Density Forecasting Based on a Double-Layer LSTM-Attention Quantile Regression. | 0 | 0.34 | 2021 |
From Data Flows to Privacy Issues: A User-Centric Semantic Model for Representing and Discovering Privacy Issues | 0 | 0.34 | 2020 |
A Novel Approach to Discover Switch Behaviours in Process Mining. | 0 | 0.34 | 2020 |
Keyword guessing attacks on a public key encryption with keyword search scheme without random oracle and its improvement. | 3 | 0.38 | 2019 |
Constructing Designated Server Public Key Encryption With Keyword Search Schemes Withstanding Keyword Guessing Attacks | 0 | 0.34 | 2019 |
Constructing pairing-free certificateless public key encryption with keyword search. | 2 | 0.40 | 2019 |
Optimizing Speech-Input Length for Speaker-Independent Depression Classification | 0 | 0.34 | 2019 |
A Forward-Secure Certificate-Based Signature Scheme with Enhanced Security in the Standard Model. | 0 | 0.34 | 2019 |
SCF-PEPCKS: Secure Channel Free Public Key Encryption With Privacy-Conserving Keyword Search. | 0 | 0.34 | 2019 |
Multi-Scale Dual-Branch Fully Convolutional Network for Hand Parsing. | 0 | 0.34 | 2019 |
Information Communication Technology and Global Logistic Performance. | 0 | 0.34 | 2019 |
2018 Low-Power Image Recognition Challenge. | 0 | 0.34 | 2018 |
Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model. | 0 | 0.34 | 2017 |
Industry 4.0: A Survey on Technologies, Applications and Open Research Issues | 67 | 2.83 | 2017 |
Industry 4.0: A Survey on Technologies, Applications and Open Research Issues | 67 | 2.83 | 2017 |
Efficient designated server identity-based encryption with conjunctive keyword search. | 6 | 0.44 | 2017 |
Forward-secure identity-based encryption with direct chosen-ciphertext security in the standard model. | 0 | 0.34 | 2017 |
New Construction of Short Certificate-Based Signature against Existential Forgery Attacks. | 0 | 0.34 | 2017 |
Enhanced Certificate-Based Encryption Scheme without Bilinear Pairings", KSII Transactions on Internet and Information Systems. | 0 | 0.34 | 2016 |
Comment on a certificateless one-pass and two-party authenticated key agreement protocol. | 0 | 0.34 | 2016 |
A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds | 13 | 0.56 | 2016 |
Multi-scale Shot Segmentation Based on Weighted Subregion Color Histogram. | 0 | 0.34 | 2015 |
The Visual Object Tracking Vot2014 Challenge Results | 24 | 0.97 | 2015 |
Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds. | 3 | 0.39 | 2015 |
Learning FRAME Models Using CNN Filters for Knowledge Visualization. | 1 | 0.43 | 2015 |
An improved certificateless strong key-insulated signature scheme in the standard model. | 3 | 0.38 | 2015 |
3D Reconstruction and Visualization of Volume Data in Electrical Capacitance Tomography. | 0 | 0.34 | 2013 |
Application of FDTD and Harmony Search Algorithm for Inverse Scattering Problem. | 0 | 0.34 | 2013 |
LSBN: A Large-Scale Bayesian Structure Learning Framework for Model Averaging | 1 | 0.41 | 2012 |
Efficient and Generic Construction of Certification-Based Encryption in the Standard Model Based on the NIZK Proof System. | 0 | 0.34 | 2012 |
LAGE: A Java Framework to reconstruct Gene Regulatory Networks from Large-Scale Continues Expression Data | 0 | 0.34 | 2012 |
Adaptive Compressive Sampling for Wideband Signals | 3 | 0.42 | 2011 |
Further Observations on Certificate-Base Encryption and its Generic Construction from Certificateless Public Key Encryption. | 0 | 0.34 | 2010 |
Threshold Certificate-based Encryption | 1 | 0.35 | 2009 |
An Energy Optimization Protocol Based on Cross-Layer for Wireless Sensor Networks | 12 | 0.69 | 2008 |
Towards Efficient and Flexible KNN Query Processing in Real-Life Road Networks | 0 | 0.34 | 2008 |