Found: 40
Select item for more details and to access through your institution.
A practical RFID authentication mechanism for digital television.
- Published in:
- Telecommunication Systems, 2014, v. 57, n. 3, p. 239, doi. 10.1007/s11235-013-9844-5
- By:
- Publication type:
- Article
A Novel Group Ownership Delegate Protocol for RFID Systems.
- Published in:
- Information Systems Frontiers, 2019, v. 21, n. 5, p. 1153, doi. 10.1007/s10796-018-9835-x
- By:
- Publication type:
- Article
Towards secure authenticating of cache in the reader for RFID-based IoT systems.
- Published in:
- Peer-to-Peer Networking & Applications, 2018, v. 11, n. 1, p. 198, doi. 10.1007/s12083-017-0564-6
- By:
- Publication type:
- Article
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2019, v. 23, n. 16, p. 6937, doi. 10.1007/s00500-018-3332-5
- By:
- Publication type:
- Article
An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2019, v. 23, n. 15, p. 6937, doi. 10.1007/s00500-018-3332-5
- By:
- Publication type:
- Article
An efficient online/offline ID-based short signature procedure using extended chaotic maps.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2019, v. 23, n. 3, p. 747, doi. 10.1007/s00500-018-3112-2
- By:
- Publication type:
- Article
A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2018, v. 22, n. 8, p. 2495, doi. 10.1007/s00500-017-2504-z
- By:
- Publication type:
- Article
A secure key authentication scheme for cryptosystems based on GDLP and IFP.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2017, v. 21, n. 24, p. 7285, doi. 10.1007/s00500-016-2440-3
- By:
- Publication type:
- Article
A secure chaotic maps-based privacy-protection scheme for multi-server environments.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 14, p. 2276, doi. 10.1002/sec.1487
- By:
- Publication type:
- Article
Time-bound key-aggregate encryption for cloud storage.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 13, p. 2059, doi. 10.1002/sec.1463
- By:
- Publication type:
- Article
Non-Orthogonal Multiple Access Enabled Mobile Edge Computing in 6G Communications: A Systematic Literature Review.
- Published in:
- Sustainability (2071-1050), 2023, v. 15, n. 9, p. 7315, doi. 10.3390/su15097315
- By:
- Publication type:
- Article
Blockchain-Based Anti-Counterfeiting Management System for Traceable Luxury Products.
- Published in:
- Sustainability (2071-1050), 2022, v. 14, n. 19, p. 12814, doi. 10.3390/su141912814
- By:
- Publication type:
- Article
AN IMPROVEMENT OF REMOTE AUTHENTICATION AND KEY AGREEMENT SCHEMES.
- Published in:
- Journal of Circuits, Systems & Computers, 2011, v. 20, n. 4, p. 697, doi. 10.1142/S0218126611007554
- By:
- Publication type:
- Article
A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.
- Published in:
- Journal of Medical Systems, 2016, v. 40, n. 11, p. 1, doi. 10.1007/s10916-016-0586-2
- By:
- Publication type:
- Article
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System.
- Published in:
- Journal of Medical Systems, 2016, v. 40, n. 5, p. 1, doi. 10.1007/s10916-016-0474-9
- By:
- Publication type:
- Article
A Hash Based Remote User Authentication and Authenticated Key Agreement Scheme for the Integrated EPR Information System.
- Published in:
- Journal of Medical Systems, 2015, v. 39, n. 11, p. 1, doi. 10.1007/s10916-015-0322-3
- By:
- Publication type:
- Article
A Secure RFID Tag Authentication Protocol with Privacy Preserving in Telecare Medicine Information System.
- Published in:
- Journal of Medical Systems, 2015, v. 39, n. 8, p. 1, doi. 10.1007/s10916-015-0260-0
- By:
- Publication type:
- Article
A Secure Chaotic Maps and Smart Cards Based Password Authentication and Key Agreement Scheme with User Anonymity for Telecare Medicine Information Systems.
- Published in:
- Journal of Medical Systems, 2014, v. 38, n. 9, p. 1, doi. 10.1007/s10916-014-0077-2
- By:
- Publication type:
- Article
An extended chaotic maps-based keyword search scheme over encrypted data resist outside and inside keyword guessing attacks in cloud storage services.
- Published in:
- Nonlinear Dynamics, 2015, v. 80, n. 3, p. 1601, doi. 10.1007/s11071-015-1965-9
- By:
- Publication type:
- Article
A new three-party-authenticated key agreement scheme based on chaotic maps without password table.
- Published in:
- Nonlinear Dynamics, 2015, v. 79, n. 4, p. 2485, doi. 10.1007/s11071-014-1827-x
- By:
- Publication type:
- Article
An extended chaotic-maps-based protocol with key agreement for multiserver environments.
- Published in:
- Nonlinear Dynamics, 2014, v. 76, n. 1, p. 853, doi. 10.1007/s11071-013-1174-3
- By:
- Publication type:
- Article
An extended chaotic maps based user authentication and privacy preserving scheme against DoS attacks in pervasive and ubiquitous computing environments.
- Published in:
- Nonlinear Dynamics, 2013, v. 74, n. 4, p. 1133, doi. 10.1007/s11071-013-1029-y
- By:
- Publication type:
- Article
A three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps.
- Published in:
- Nonlinear Dynamics, 2013, v. 73, n. 1/2, p. 125, doi. 10.1007/s11071-013-0772-4
- By:
- Publication type:
- Article
Optimal Radio Propagation Modeling and Parametric Tuning Using Optimization Algorithms.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 11, p. 621, doi. 10.3390/info14110621
- By:
- Publication type:
- Article
Atmospheric Propagation Modelling for Terrestrial Radio Frequency Communication Links in a Tropical Wet and Dry Savanna Climate.
- Published in:
- Information (2078-2489), 2022, v. 13, n. 3, p. 141, doi. 10.3390/info13030141
- By:
- Publication type:
- Article
A Traceable Online Insurance Claims System Based on Blockchain and Smart Contract Technology.
- Published in:
- Sustainability (2071-1050), 2021, v. 13, n. 16, p. 9386, doi. 10.3390/su13169386
- By:
- Publication type:
- Article
Application of Extended Normal Distribution in Option Price Sensitivities.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 15, p. 2346, doi. 10.3390/math12152346
- By:
- Publication type:
- Article
Data-Driven Diffraction Loss Estimation for Future Intelligent Transportation Systems in 6G Networks.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 13, p. 3004, doi. 10.3390/math11133004
- By:
- Publication type:
- Article
Some New Properties of Convex Fuzzy-Number-Valued Mappings on Coordinates Using Up and Down Fuzzy Relations and Related Inequalities.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 13, p. 2851, doi. 10.3390/math11132851
- By:
- Publication type:
- Article
CBFISKD: A Combinatorial-Based Fuzzy Inference System for Keylogger Detection.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 8, p. 1899, doi. 10.3390/math11081899
- By:
- Publication type:
- Article
Enhanced Convolutional Neural Network Model for Cassava Leaf Disease Identification and Classification.
- Published in:
- Mathematics (2227-7390), 2022, v. 10, n. 4, p. N.PAG, doi. 10.3390/math10040580
- By:
- Publication type:
- Article
An Ensemble Tree-Based Model for Intrusion Detection in Industrial Internet of Things Networks.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 4, p. 2479, doi. 10.3390/app13042479
- By:
- Publication type:
- Article
Development of a Multilayer Perceptron Neural Network for Optimal Predictive Modeling in Urban Microcellular Radio Environments.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 11, p. 5713, doi. 10.3390/app12115713
- By:
- Publication type:
- Article
A subtree‐based transformation model for cryptosystem using chaotic maps under cloud computing environment for fuzzy user data sharing.
- Published in:
- International Journal of Communication Systems, 2020, v. 33, n. 7, p. 1, doi. 10.1002/dac.4307
- By:
- Publication type:
- Article
A simple and efficient authentication scheme for mobile satellite communication systems.
- Published in:
- International Journal of Satellite Communications & Networking, 2012, v. 30, n. 1, p. 29, doi. 10.1002/sat.993
- By:
- Publication type:
- Article
Securing Critical User Information over the Internet of Medical Things Platforms Using a Hybrid Cryptography Scheme.
- Published in:
- Future Internet, 2023, v. 15, n. 3, p. 99, doi. 10.3390/fi15030099
- By:
- Publication type:
- Article
Joint Random Forest and Particle Swarm Optimization for Predictive Pathloss Modeling of Wireless Signals from Cellular Networks.
- Published in:
- Future Internet, 2022, v. 14, n. 12, p. 373, doi. 10.3390/fi14120373
- By:
- Publication type:
- Article
An Efficient Authenticated Key Agreement Scheme Supporting Privacy-Preservation for Internet of Drones Communications.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 23, p. 9534, doi. 10.3390/s22239534
- By:
- Publication type:
- Article
Design and Implementation of an ML and IoT Based Adaptive Traffic-Management System for Smart Cities.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 8, p. N.PAG, doi. 10.3390/s22082908
- By:
- Publication type:
- Article
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem.
- Published in:
- Parallel Processing Letters, 2016, v. 26, n. 4, p. -1, doi. 10.1142/S0129626416500183
- By:
- Publication type:
- Article