Found: 9
Select item for more details and to access through your institution.
Two-Dimensional Projection-Based Wireless Intrusion Classification Using Lightweight EfficientNet.
- Published in:
- Computers, Materials & Continua, 2022, v. 72, n. 3, p. 5301, doi. 10.32604/cmc.2022.026749
- By:
- Publication type:
- Article
Differentially private client-side data deduplication protocol for cloud storage services.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 12, p. 2114, doi. 10.1002/sec.1159
- By:
- Publication type:
- Article
A scalable and robust hierarchical key establishment for mission-critical applications over sensor networks.
- Published in:
- Telecommunication Systems, 2013, v. 52, n. 2, p. 1377, doi. 10.1007/s11235-011-9650-x
- By:
- Publication type:
- Article
Resuscitating privacy-preserving mobile payment with customer in complete control.
- Published in:
- Personal & Ubiquitous Computing, 2012, v. 16, n. 6, p. 643, doi. 10.1007/s00779-011-0436-7
- By:
- Publication type:
- Article
Efficient Authenticated Key Agreement Protocols for Dynamic Wireless Sensor Networks.
- Published in:
- Adhoc & Sensor Wireless Networks, 2012, v. 14, n. 3/4, p. 251
- By:
- Publication type:
- Article
A scalable and efficient key escrow model for lawful interception of IDBC-based secure communication.
- Published in:
- International Journal of Communication Systems, 2011, v. 24, n. 4, p. 461, doi. 10.1002/dac.1165
- By:
- Publication type:
- Article
Untraceable Mobile Node Authentication in WSN.
- Published in:
- Sensors (14248220), 2010, v. 10, n. 5, p. 4410, doi. 10.3390/s100504410
- By:
- Publication type:
- Article
Untraceable Mobile Node Authentication in WSN.
- Published in:
- Sensors (14248220), 2010, v. 10, n. 2, p. 4410, doi. 10.3390/s100504410
- By:
- Publication type:
- Article
A secure mutual authentication scheme with key agreement using smart card from bilinear pairings.
- Published in:
- Computer Systems Science & Engineering, 2008, v. 23, n. 3, p. 139
- By:
- Publication type:
- Article