Found: 36
Select item for more details and to access through your institution.
Editorial: Security and Privacy in Computing and Communications.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1407, doi. 10.1007/s11036-020-01683-4
- By:
- Publication type:
- Article
A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1412, doi. 10.1007/s11036-019-01459-5
- By:
- Publication type:
- Article
Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1430, doi. 10.1007/s11036-019-01460-y
- By:
- Publication type:
- Article
Throughput Analysis of Smart Buildings-oriented Wireless Networks under Jamming Attacks.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1440, doi. 10.1007/s11036-019-01481-7
- By:
- Publication type:
- Article
Cognitive Radio Based System for Best Effort Communications in Sound-based Covert Channel for IoT Environments.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1449, doi. 10.1007/s11036-019-01482-6
- By:
- Publication type:
- Article
Intrusion Detection System for IoT Heterogeneous Perceptual Network.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1461, doi. 10.1007/s11036-019-01483-5
- By:
- Publication type:
- Article
Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1475, doi. 10.1007/s11036-019-01484-4
- By:
- Publication type:
- Article
A Timestamp-Regulating VoLTE Covert Channel against Statistical Analysis.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1493, doi. 10.1007/s11036-019-01485-3
- By:
- Publication type:
- Article
An Efficient Bounded Model Checking Approach for Web Service Composition.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1503, doi. 10.1007/s11036-019-01486-2
- By:
- Publication type:
- Article
PRIA: a Multi-source Recognition Method Based on Partial Observation in SIR Model.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1514, doi. 10.1007/s11036-019-01487-1
- By:
- Publication type:
- Article
A Privacy-sensitive Service Selection Method Based on Artificial Fish Swarm Algorithm in the Internet of Things.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1523, doi. 10.1007/s11036-019-01488-0
- By:
- Publication type:
- Article
Security Assessment for Interdependent Heterogeneous Cyber Physical Systems.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1532, doi. 10.1007/s11036-019-01489-z
- By:
- Publication type:
- Article
Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1543, doi. 10.1007/s11036-019-01490-6
- By:
- Publication type:
- Article
Correction to: Identity-based Multi-Recipient Public Key Encryption Scheme and Its Application in IoT.
- Published in:
- 2021
- By:
- Publication type:
- Correction Notice
A Graded Reversible Watermarking Scheme for Relational Data.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1552, doi. 10.1007/s11036-019-01491-5
- By:
- Publication type:
- Article
A Novel Algorithm for Improving Malicious Node Detection Effect in Wireless Sensor Networks.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1564, doi. 10.1007/s11036-019-01492-4
- By:
- Publication type:
- Article
A Privacy-preserving Fuzzy Search Scheme Supporting Logic Query over Encrypted Cloud Data.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1574, doi. 10.1007/s11036-019-01493-3
- By:
- Publication type:
- Article
Quadratic Poly Certificateless Inductive Signcryption for Network Security.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1586, doi. 10.1007/s11036-019-01496-0
- By:
- Publication type:
- Article
An Efficient Scheme of Cloud Data Assured Deletion.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1597, doi. 10.1007/s11036-019-01497-z
- By:
- Publication type:
- Article
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1609, doi. 10.1007/s11036-019-01498-y
- By:
- Publication type:
- Article
An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1616, doi. 10.1007/s11036-019-01499-x
- By:
- Publication type:
- Article
Network Risk Assessment Based on Baum Welch Algorithm and HMM.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1630, doi. 10.1007/s11036-019-01500-7
- By:
- Publication type:
- Article
A Confidence-Guided Evaluation for Log Parsers Inner Quality.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1638, doi. 10.1007/s11036-019-01501-6
- By:
- Publication type:
- Article
A Fault Tolerant Mechanism for UE Authentication in 5G Networks.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1650, doi. 10.1007/s11036-019-01502-5
- By:
- Publication type:
- Article
Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1668, doi. 10.1007/s11036-019-01503-4
- By:
- Publication type:
- Article
Secure Encrypted Data Deduplication Based on Data Popularity.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1686, doi. 10.1007/s11036-019-01504-3
- By:
- Publication type:
- Article
Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1696, doi. 10.1007/s11036-019-01505-2
- By:
- Publication type:
- Article
MF-CNN: a New Approach for LDoS Attack Detection Based on Multi-feature Fusion and CNN.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1705, doi. 10.1007/s11036-019-01506-1
- By:
- Publication type:
- Article
Research on Intelligent Detection of Command Level Stack Pollution for Binary Program Analysis.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1723, doi. 10.1007/s11036-019-01507-0
- By:
- Publication type:
- Article
ShadowFPE: New Encrypted Web Application Solution Based on Shadow DOM.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1733, doi. 10.1007/s11036-019-01509-y
- By:
- Publication type:
- Article
Convergence of 5G Technologies, Artificial Intelligence and Cybersecurity of Networked Societies for the Cities of Tomorrow.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1747, doi. 10.1007/s11036-021-01778-6
- By:
- Publication type:
- Article
Energy efficiency of full-duplex cognitive radio in low-power regimes under imperfect spectrum sensing.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1750, doi. 10.1007/s11036-021-01755-z
- By:
- Publication type:
- Article
ClusTi: Clustering Method for Table Structure Recognition in Scanned Images.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1765, doi. 10.1007/s11036-021-01759-9
- By:
- Publication type:
- Article
Evaluating the Performance of Full-Duplex Energy Harvesting Vehicle-to-Vehicle Communication System over Double Rayleigh Fading Channels.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1777, doi. 10.1007/s11036-021-01756-y
- By:
- Publication type:
- Article
Meteorological and Hydrological Drought Assessment for Dong Nai River Basin, Vietnam under Climate Change.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1788, doi. 10.1007/s11036-021-01757-x
- By:
- Publication type:
- Article
A Reliable Link-Adaptive Position-Based Routing Protocol for Flying ad hoc Network.
- Published in:
- Mobile Networks & Applications, 2021, v. 26, n. 4, p. 1801, doi. 10.1007/s11036-021-01758-w
- By:
- Publication type:
- Article