Found: 20
Select item for more details and to access through your institution.
A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2014, v. 8, n. 9, p. 3250, doi. 10.3837/tiis.2014.09.017
- By:
- Publication type:
- Article
Study on Curve Fitting Method for Creep Coefficient of Prestressed Concrete Bridges.
- Published in:
- Railway Standard Design, 2024, v. 68, n. 10, p. 105, doi. 10.13238/j.issn.1004-2954.202302250002
- By:
- Publication type:
- Article
Research on Hanger Tensioning Scheme of High-speed Railway Long-span Continuous Rigid Frame Arch Bridge.
- Published in:
- Railway Standard Design, 2022, v. 66, n. 3, p. 82, doi. 10.13238/j.issn.1004-2954.202103080007
- By:
- Publication type:
- Article
Nframe: A privacy-preserving with non-frameability handover authentication protocol based on ( t, n) secret sharing for LTE/LTE-A networks.
- Published in:
- Wireless Networks (10220038), 2017, v. 23, n. 7, p. 2165, doi. 10.1007/s11276-016-1277-0
- By:
- Publication type:
- Article
DP-QIC: A differential privacy scheme based on quasi-identifier classification for big data publication.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2021, v. 25, n. 11, p. 7325, doi. 10.1007/s00500-021-05692-7
- By:
- Publication type:
- Article
Optimization of the time series NDVI-rainfall relationship using linear mixed-effects modeling for the anti-desertification area in the Beijing and Tianjin sandstorm source region.
- Published in:
- Theoretical & Applied Climatology, 2018, v. 132, n. 3-4, p. 1291, doi. 10.1007/s00704-017-2144-3
- By:
- Publication type:
- Article
A Calibration Method for Large-Footprint Full-Waveform Airborne Laser Altimeter without a Calibration Field.
- Published in:
- Remote Sensing, 2023, v. 15, n. 11, p. 2789, doi. 10.3390/rs15112789
- By:
- Publication type:
- Article
Estimation of Forest Aboveground Biomass in Changbai Mountain Region Using ICESat/GLAS and Landsat/TM Data.
- Published in:
- Remote Sensing, 2017, v. 9, n. 7, p. 707, doi. 10.3390/rs9070707
- By:
- Publication type:
- Article
National Forest Aboveground Biomass Mapping from ICESat/GLAS Data and MODIS Imagery in China.
- Published in:
- Remote Sensing, 2015, v. 7, n. 5, p. 5534, doi. 10.3390/rs70505534
- By:
- Publication type:
- Article
Privacy-Preserving Public Auditing for Non-manager Group Shared Data.
- Published in:
- Wireless Personal Communications, 2018, v. 100, n. 4, p. 1277, doi. 10.1007/s11277-018-5634-4
- By:
- Publication type:
- Article
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks.
- Published in:
- Wireless Personal Communications, 2014, v. 79, n. 2, p. 1277, doi. 10.1007/s11277-014-1930-9
- By:
- Publication type:
- Article
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks.
- Published in:
- Wireless Personal Communications, 2013, v. 70, n. 4, p. 1793, doi. 10.1007/s11277-012-0781-5
- By:
- Publication type:
- Article
Survey of attack and detection based on the full life cycle of APT.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2024, v. 45, n. 9, p. 106, doi. 10.11959/j.issn.1000-436x.2024128
- By:
- Publication type:
- Article
Survey on industrial control protocol security research.
- Published in:
- Journal on Communication / Tongxin Xuebao, 2024, v. 45, n. 6, p. 60, doi. 10.11959/j.issn.1000-436x.2024104
- By:
- Publication type:
- Article
Estimating the Impact of Land Cover Change on Soil Erosion Using Remote Sensing and GIS Data by USLE Model and Scenario Design.
- Published in:
- Scientific Programming, 2021, p. 1, doi. 10.1155/2021/6633428
- By:
- Publication type:
- Article
SeShare: Secure cloud data sharing based on blockchain and public auditing.
- Published in:
- Concurrency & Computation: Practice & Experience, 2019, v. 31, n. 22, p. N.PAG, doi. 10.1002/cpe.4359
- By:
- Publication type:
- Article
IMCSA: Providing Better Sequence Alignment Space for Industrial Control Protocol Reverse Engineering.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/8026280
- By:
- Publication type:
- Article
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 13, p. 2002, doi. 10.1002/sec.1455
- By:
- Publication type:
- Article
An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage.
- Published in:
- Journal of Circuits, Systems & Computers, 2019, v. 28, n. 11, p. N.PAG, doi. 10.1142/S021812661950186X
- By:
- Publication type:
- Article
CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution.
- Published in:
- International Journal of Foundations of Computer Science, 2020, v. 31, n. 2, p. 175, doi. 10.1142/S0129054120500021
- By:
- Publication type:
- Article