Found: 50
Select item for more details and to access through your institution.
Application of Differential Geometry to the Array Manifolds of Linear Arrays in Antenna Array Processing.
- Published in:
- Electronics (2079-9292), 2021, v. 10, n. 23, p. 2964, doi. 10.3390/electronics10232964
- By:
- Publication type:
- Article
An Efficient and Provably Secure Certificateless Blind Signature Scheme for Flying Ad-Hoc Network Based on Multi-Access Edge Computing.
- Published in:
- Electronics (2079-9292), 2020, v. 9, n. 1, p. 30, doi. 10.3390/electronics9010030
- By:
- Publication type:
- Article
An Energy Efficient and Formally Secured Certificate-Based Signcryption for Wireless Body Area Networks with the Internet of Things.
- Published in:
- Electronics (2079-9292), 2019, v. 8, n. 10, p. 1171, doi. 10.3390/electronics8101171
- By:
- Publication type:
- Article
A Cost-Effective Identity-Based Signature Scheme for Vehicular Ad Hoc Network Using Hyperelliptic Curve Cryptography.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/5012770
- By:
- Publication type:
- Article
An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/4215441
- By:
- Publication type:
- Article
A Cost Effective Identity-Based Authentication Scheme for Internet of Things-Enabled Agriculture.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/4275243
- By:
- Publication type:
- Article
An Efficient Multidocument Blind Signcryption Scheme for Smart Grid-Enabled Industrial Internet of Things.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/7779152
- By:
- Publication type:
- Article
Certificate-Based Signature Scheme for Industrial Internet of Things Using Hyperelliptic Curve Cryptography.
- Published in:
- Wireless Communications & Mobile Computing, 2022, p. 1, doi. 10.1155/2022/7336279
- By:
- Publication type:
- Article
A Review of Big Data Resource Management: Using Smart Grid Systems as a Case Study.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/3740476
- By:
- Publication type:
- Article
A Resource-Friendly Certificateless Proxy Signcryption Scheme for Drones in Networks beyond 5G.
- Published in:
- Drones (2504-446X), 2023, v. 7, n. 5, p. 321, doi. 10.3390/drones7050321
- By:
- Publication type:
- Article
An Efficient Authentication Scheme Using Blockchain as a Certificate Authority for the Internet of Drones.
- Published in:
- Drones (2504-446X), 2022, v. 6, n. 10, p. 264, doi. 10.3390/drones6100264
- By:
- Publication type:
- Article
Towards the Unmanned Aerial Vehicles (UAVs): A Comprehensive Review.
- Published in:
- Drones (2504-446X), 2022, v. 6, n. 6, p. 147, doi. 10.3390/drones6060147
- By:
- Publication type:
- Article
Numerical Investigation of Thin Film Flow of a Third-Grade Fluid on a Moving Belt Using Evolutionary Algorithm-Based Heuristic Technique.
- Published in:
- Journal of Circuits, Systems & Computers, 2022, v. 31, n. 1, p. 1, doi. 10.1142/S0218126622500116
- By:
- Publication type:
- Article
An Efficient and Provable Secure Certificate-Based Combined Signature, Encryption and Signcryption Scheme for Internet of Things (IoT) in Mobile Health (M-Health) System.
- Published in:
- Journal of Medical Systems, 2021, v. 45, n. 1, p. 1, doi. 10.1007/s10916-020-01658-8
- By:
- Publication type:
- Article
A Malware Detection Scheme via Smart Memory Forensics for Windows Devices.
- Published in:
- Mobile Information Systems, 2022, v. 2022, p. 1, doi. 10.1155/2022/9156514
- By:
- Publication type:
- Article
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content-Centric Network (CCN).
- Published in:
- Mobile Information Systems, 2020, p. 1, doi. 10.1155/2020/4138516
- By:
- Publication type:
- Article
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity-Based Generalized Signcryption.
- Published in:
- Mobile Information Systems, 2020, p. 1, doi. 10.1155/2020/8861947
- By:
- Publication type:
- Article
A Lightweight and Provable Secured Certificateless Signcryption Approach for Crowdsourced IIoT Applications.
- Published in:
- Symmetry (20738994), 2019, v. 11, n. 11, p. 1386, doi. 10.3390/sym11111386
- By:
- Publication type:
- Article
Cost-Effective Proxy Signcryption Scheme for Internet of Things.
- Published in:
- Mobile Information Systems, 2021, p. 1, doi. 10.1155/2021/2427434
- By:
- Publication type:
- Article
A Dual-Mode Medium Access Control Mechanism for UAV-Enabled Intelligent Transportation System.
- Published in:
- Mobile Information Systems, 2021, p. 1, doi. 10.1155/2021/5578490
- By:
- Publication type:
- Article
A Perfect Knob to Scale Thread Pool on Runtime.
- Published in:
- Computers, Materials & Continua, 2022, v. 72, n. 1, p. 1483, doi. 10.32604/cmc.2022.024936
- By:
- Publication type:
- Article
Evaluating the Efficiency of CBAM-Resnet Using Malaysian Sign Language.
- Published in:
- Computers, Materials & Continua, 2022, v. 71, n. 2, p. 2755, doi. 10.32604/cmc.2022.022471
- By:
- Publication type:
- Article
Hyper Elliptic Curve Based Certificateless Signcryption Scheme for Secure IIoT Communications.
- Published in:
- Computers, Materials & Continua, 2022, v. 71, n. 2, p. 2515, doi. 10.32604/cmc.2022.019800
- By:
- Publication type:
- Article
An Access Control Scheme Using Heterogeneous Signcryption for IoT Environments.
- Published in:
- Computers, Materials & Continua, 2022, v. 70, n. 3, p. 4307, doi. 10.32604/cmc.2022.017380
- By:
- Publication type:
- Article
An Efficient Proxy Blind Signcryption Scheme for IoT.
- Published in:
- Computers, Materials & Continua, 2022, v. 70, n. 3, p. 4293, doi. 10.32604/cmc.2022.017318
- By:
- Publication type:
- Article
Speech Recognition-Based Automated Visual Acuity Testing with Adaptive Mel Filter Bank.
- Published in:
- Computers, Materials & Continua, 2022, v. 70, n. 2, p. 2991, doi. 10.32604/cmc.2022.020376
- By:
- Publication type:
- Article
Ambiguity Resolution in Direction of Arrival Estimation with Linear Antenna Arrays Using Differential Geometry.
- Published in:
- Computers, Materials & Continua, 2022, v. 70, n. 1, p. 581, doi. 10.32604/cmc.2022.018963
- By:
- Publication type:
- Article
A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 23, p. 13184, doi. 10.3390/su132313184
- By:
- Publication type:
- Article
An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 19, p. 10891, doi. 10.3390/su131910891
- By:
- Publication type:
- Article
Cost-Efficient Privacy-Preserving Authentication and Key Management Scheme for Internet of Vehicle Ecosystem.
- Published in:
- Complexity, 2022, p. 1, doi. 10.1155/2022/8406649
- By:
- Publication type:
- Article
Addendum: Ullah, I., et al. A Novel Provable Secured Signcryption Scheme PSSS: A Hyper-Elliptic Curve-Based Approach. Mathematics 2019, 7, 686.
- Published in:
- Mathematics (2227-7390), 2020, v. 8, n. 3, p. 370, doi. 10.3390/math8030370
- By:
- Publication type:
- Article
A Novel Provable Secured Signcryption Scheme 𝒫𝒮𝒮𝒮: A Hyper-Elliptic Curve-Based Approach.
- Published in:
- Mathematics (2227-7390), 2019, v. 7, n. 8, p. 686, doi. 10.3390/math7080686
- By:
- Publication type:
- Article
A Critique on Task Allocation Processes in Distributed Agile Software Development.
- Published in:
- Scientific Programming, 2022, p. 1, doi. 10.1155/2022/8312253
- By:
- Publication type:
- Article
The Double Edge Sword Based Distributed Executor Service.
- Published in:
- Computer Systems Science & Engineering, 2022, v. 42, n. 2, p. 589, doi. 10.32604/csse.2022.022319
- By:
- Publication type:
- Article
An Efficient Medium Access Control Mechanism for Flying Ad-hoc Networks.
- Published in:
- Computer Systems Science & Engineering, 2021, v. 38, n. 1, p. 47, doi. 10.32604/csse.2021.016430
- By:
- Publication type:
- Article
An Efficient Certificateless Forward-Secure Signature Scheme for Secure Deployments of the Internet of Things.
- Published in:
- Journal of Sensor & Actuator Networks, 2023, v. 12, n. 1, p. 10, doi. 10.3390/jsan12010010
- By:
- Publication type:
- Article
A Hyperelliptic Curve Cryptosystem Based Proxy Promised Signcryption Scheme.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/1232336
- By:
- Publication type:
- Article
An Efficient Certificate-Based Aggregate Signature Scheme for Internet of Drones.
- Published in:
- Security & Communication Networks, 2022, v. 2022, p. 1, doi. 10.1155/2022/9718580
- By:
- Publication type:
- Article
A Lightweight Proxy Re-Encryption Approach with Certificate-Based and Incremental Cryptography for Fog-Enabled E-Healthcare.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/9363824
- By:
- Publication type:
- Article
Crop Yield Maximization Using an IoT-Based Smart Decision.
- Published in:
- Journal of Sensors, 2022, p. 1, doi. 10.1155/2022/2022923
- By:
- Publication type:
- Article
An Efficient and Secure Certificateless Aggregate Signature Scheme for Vehicular Ad hoc Networks.
- Published in:
- Future Internet, 2023, v. 15, n. 8, p. 266, doi. 10.3390/fi15080266
- By:
- Publication type:
- Article
An Optimal Authentication Scheme through Dual Signature for the Internet of Medical Things.
- Published in:
- Future Internet, 2023, v. 15, n. 8, p. 258, doi. 10.3390/fi15080258
- By:
- Publication type:
- Article
An Online-Offline Certificateless Signature Scheme for Internet of Health Things.
- Published in:
- Journal of Healthcare Engineering, 2020, v. 2020, p. 1, doi. 10.1155/2020/6654063
- By:
- Publication type:
- Article
A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 12, p. 5419, doi. 10.3390/s23125419
- By:
- Publication type:
- Article
Enabling Secure Communication in Wireless Body Area Networks with Heterogeneous Authentication Scheme.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 3, p. 1121, doi. 10.3390/s23031121
- By:
- Publication type:
- Article
An Efficient and Conditional Privacy-Preserving Heterogeneous Signcryption Scheme for the Internet of Drones.
- Published in:
- Sensors (14248220), 2023, v. 23, n. 3, p. 1063, doi. 10.3390/s23031063
- By:
- Publication type:
- Article
Computer Vision-Based Wildfire Smoke Detection Using UAVs.
- Published in:
- Mathematical Problems in Engineering, 2021, p. 1, doi. 10.1155/2021/9977939
- By:
- Publication type:
- Article
An Efficient Scheme for Industrial Internet of Things Using Certificateless Signature.
- Published in:
- Mathematical Problems in Engineering, 2021, p. 1, doi. 10.1155/2021/9960264
- By:
- Publication type:
- Article
Computer Vision-Based Wildfire Smoke Detection Using UAVs.
- Published in:
- Mathematical Problems in Engineering, 2021, p. 1, doi. 10.1155/2021/9977939
- By:
- Publication type:
- Article
A Lightweight Nature Heterogeneous Generalized Signcryption (HGSC) Scheme for Named Data Networking-Enabled Internet of Things.
- Published in:
- Wireless Communications & Mobile Computing, 2020, p. 1, doi. 10.1155/2020/8857272
- By:
- Publication type:
- Article