Found: 37
Select item for more details and to access through your institution.
An object detection-based few-shot learning approach for multimedia quality assessment.
- Published in:
- Multimedia Systems, 2023, v. 29, n. 5, p. 2899, doi. 10.1007/s00530-021-00881-8
- By:
- Publication type:
- Article
DAWM: Cost-Aware Asset Claim Analysis Approach on Big Data Analytic Computation Model for Cloud Data Centre.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6688162
- By:
- Publication type:
- Article
Improved ECC-Based Three-Factor Multiserver Authentication Scheme.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/6627956
- By:
- Publication type:
- Article
Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 29, p. 41545, doi. 10.1007/s11042-020-10483-7
- By:
- Publication type:
- Article
Radiological image retrieval technique using multi-resolution texture and shape features.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 10, p. 13633, doi. 10.1007/s11042-021-10525-8
- By:
- Publication type:
- Article
Deep learning techniques for observing the impact of the global warming from satellite images of water-bodies.
- Published in:
- Multimedia Tools & Applications, 2022, v. 81, n. 5, p. 6115, doi. 10.1007/s11042-021-11811-1
- By:
- Publication type:
- Article
Efficient authentication protocol for secure multimedia communications in IoT-enabled wireless sensor networks.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 14, p. 18295, doi. 10.1007/s11042-017-5376-4
- By:
- Publication type:
- Article
A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication.
- Published in:
- Multimedia Tools & Applications, 2018, v. 77, n. 9, p. 11041, doi. 10.1007/s11042-017-4996-z
- By:
- Publication type:
- Article
Secure cognitive radio‐based synchronized transmission of 5G signals using massive MIMO‐OFDM‐ES.
- Published in:
- International Journal of Communication Systems, 2018, v. 31, n. 17, p. N.PAG, doi. 10.1002/dac.3805
- By:
- Publication type:
- Article
An anonymous and robust multi-server authentication protocol using multiple registration servers.
- Published in:
- International Journal of Communication Systems, 2017, v. 30, n. 18, p. n/a, doi. 10.1002/dac.3457
- By:
- Publication type:
- Article
A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
- Published in:
- International Journal of Communication Systems, 2017, v. 30, n. 11, p. n/a, doi. 10.1002/dac.3242
- By:
- Publication type:
- Article
Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks.
- Published in:
- International Journal of Communication Systems, 2016, v. 29, n. 17, p. 2442, doi. 10.1002/dac.2847
- By:
- Publication type:
- Article
Design and analysis of an improved smartcard-based remote user password authentication scheme.
- Published in:
- International Journal of Communication Systems, 2016, v. 29, n. 11, p. 1708, doi. 10.1002/dac.2793
- By:
- Publication type:
- Article
An anonymous and provably secure authentication scheme for mobile user.
- Published in:
- International Journal of Communication Systems, 2016, v. 29, n. 9, p. 1529, doi. 10.1002/dac.3126
- By:
- Publication type:
- Article
Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’.
- Published in:
- PLoS ONE, 2015, v. 10, n. 8, p. 1, doi. 10.1371/journal.pone.0131368
- By:
- Publication type:
- Article
CCM-PRNG: Pseudo-random bit generator based on cross-over chaotic map and its application in image encryption.
- Published in:
- Multimedia Tools & Applications, 2024, v. 83, n. 34, p. 80823, doi. 10.1007/s11042-024-18668-0
- By:
- Publication type:
- Article
A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments.
- Published in:
- Wireless Networks (10220038), 2022, v. 28, n. 7, p. 3127, doi. 10.1007/s11276-022-03017-6
- By:
- Publication type:
- Article
A heterogeneous user authentication and key establishment for mobile client–server environment.
- Published in:
- Wireless Networks (10220038), 2020, v. 26, n. 2, p. 913, doi. 10.1007/s11276-018-1839-4
- By:
- Publication type:
- Article
Model based IoT security framework using multiclass adaptive boosting with SMOTE.
- Published in:
- Security & Privacy, 2020, v. 3, n. 5, p. 1, doi. 10.1002/spy2.112
- By:
- Publication type:
- Article
Security analysis on "mutual authentication scheme for multimedia medical information systems".
- Published in:
- Security & Privacy, 2019, v. 2, n. 3, p. N.PAG, doi. 10.1002/spy2.67
- By:
- Publication type:
- Article
Leakage-Free and Provably Secure Certificateless Signcryption Scheme Using Bilinear Pairings.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2636, doi. 10.1093/comjnl/bxv002
- By:
- Publication type:
- Article
Design of pseudo-random number generator from turbulence padded chaotic map.
- Published in:
- Nonlinear Dynamics, 2021, v. 104, n. 2, p. 1627, doi. 10.1007/s11071-021-06346-x
- By:
- Publication type:
- Article
Secure content‐based image retrieval using modified Euclidean distance for encrypted features.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2021, v. 32, n. 2, p. 1, doi. 10.1002/ett.4013
- By:
- Publication type:
- Article
Secure and efficient image retrieval through invariant features selection in insecure cloud environments.
- Published in:
- Neural Computing & Applications, 2023, v. 35, n. 7, p. 4855, doi. 10.1007/s00521-021-06054-y
- By:
- Publication type:
- Article
Retraction Note: Lung cancer prediction using higher-order recurrent neural network based on glowworm swarm optimization.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
Secure CLS and CL-AS schemes designed for VANETs.
- Published in:
- Journal of Supercomputing, 2019, v. 75, n. 6, p. 3076, doi. 10.1007/s11227-018-2312-y
- By:
- Publication type:
- Article
Lung cancer prediction using higher-order recurrent neural network based on glowworm swarm optimization.
- Published in:
- Neural Computing & Applications, 2020, v. 32, n. 9, p. 4373, doi. 10.1007/s00521-018-3824-3
- By:
- Publication type:
- Article
A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks.
- Published in:
- Concurrency & Computation: Practice & Experience, 2015, v. 27, n. 17, p. 4897, doi. 10.1002/cpe.3477
- By:
- Publication type:
- Article
An effective key distribution for secure internet pay-TV using access key hierarchies.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 18, p. 5085, doi. 10.1002/sec.1680
- By:
- Publication type:
- Article
An efficient group key agreement protocol for secure P2P communication.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 3952, doi. 10.1002/sec.1578
- By:
- Publication type:
- Article
Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4166, doi. 10.1002/sec.1596
- By:
- Publication type:
- Article
An enhanced multi-server authentication protocol using password and smart-card: cryptanalysis and design.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4615, doi. 10.1002/sec.1653
- By:
- Publication type:
- Article
A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4650, doi. 10.1002/sec.1655
- By:
- Publication type:
- Article
Design of a provably secure identity-based digital multi-signature scheme using biometrics and fuzzy extractor.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 16, p. 3229, doi. 10.1002/sec.1528
- By:
- Publication type:
- Article
Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 13, p. 2214, doi. 10.1002/sec.1165
- By:
- Publication type:
- Article
Deep Learning Inspired Nonlinear Classification Methodology for Handwritten Digits Recognition Using DSR Encoder.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2023, v. 48, n. 2, p. 1385, doi. 10.1007/s13369-022-06865-8
- By:
- Publication type:
- Article
IIRM: Intelligent Information Retrieval Model for Structured Documents by One-Shot Training Using Computer Vision.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2023, v. 48, n. 2, p. 1285, doi. 10.1007/s13369-022-06735-3
- By:
- Publication type:
- Article