-
241
Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
Published 2016-09-01Subjects: Get full text
Article -
242
Single password authentication method for remote user based on mobile terminal assistance
Published 2019-02-01Subjects: Get full text
Article -
243
Cooperative sensing method considering malicious nodes in cognitive radio networks
Published 2015-06-01Subjects: Get full text
Article -
244
D2D data sharing partner selection mechanism based on privacy degree and stability degree
Published 2019-12-01Subjects: “…D2D data sharing…”
Get full text
Article -
245
ADDRESSING SOCIETAL CHALLENGES IN THE BLACK SEA CATCHMENT THROUGH INNOVATIVE EARTH OBSERVATION SYSTEM OF SYSTEMS
Published 2014-12-01Subjects: Get full text
Article -
246
Novel auction-based spectrum sharing scheme with the compensation and motivation mechanism
Published 2011-01-01Subjects: Get full text
Article -
247
Performance analysis of generalized processor sharing based on fractal leaky bucket regulators
Published 2006-01-01Subjects: “…generalized processor sharing…”
Get full text
Article -
248
Aux origines de la privatisation du financement du soin : quand la théorie de l’aléa moral rencontre le capitalisme sanitaire
Published 2015-06-01Subjects: Get full text
Article -
249
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: Get full text
Article -
250
The impact of collaborative atmosphere on innovative work behavior of college teachers, North China
Published 2025-01-01Subjects: Get full text
Article -
251
Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication
Published 2024-12-01Subjects: Get full text
Article -
252
Study of spectrum sharing in integrated satellite-terrestrial system based on space-based interference cartography
Published 2024-03-01Subjects: Get full text
Article -
253
-
254
Participative Urban Air Quality Monitoring Using Open Source Devices
Published 2019-06-01Subjects: Get full text
Article -
255
Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage
Published 2024-09-01Subjects: Get full text
Article -
256
Measurement and modeling of the peer-to-peer sharing objects popularity
Published 2009-01-01Subjects: Get full text
Article -
257
Block level cloud data deduplication scheme based on attribute encryption
Published 2023-10-01Subjects: Get full text
Article -
258
The effects of profit-sharing distributions on employee stock purchase plan participation
Published 2025-02-01Subjects: Get full text
Article -
259
Comparison of Continuous-Time Partial Markov Chain Construction by Heuristic Algorithms for Purpose of Approximate Transient Analysis
Published 2025-01-01Subjects: Get full text
Article -
260
Integrating online training and knowledge sharing among teachers through a cloud-based video platform
Published 2024-12-01Subjects: Get full text
Article