-
181
-
182
Game theoretical routing protocol with fairness problem in wireless mesh networks
Published 2012-11-01Subjects: Get full text
Article -
183
HMGB-1 as a predictor of major bleeding requiring activation of a massive transfusion protocol in severe trauma
Published 2025-02-01Subjects: Get full text
Article -
184
Efficient secure federated learning aggregation framework based on homomorphic encryption
Published 2023-01-01Subjects: Get full text
Article -
185
Routing Protocol for Intelligent Unmanned Cluster Network Based on Node Energy Consumption and Mobility Optimization
Published 2025-01-01Subjects: Get full text
Article -
186
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01Subjects: Get full text
Article -
187
LiteST: a lightweight secure time synchronization protocol for wireless sensor networks
Published 2009-01-01Subjects: “…time synchronization protocol…”
Get full text
Article -
188
Rapid responsive and efficient multi-valued Byzantine consensus scheme
Published 2021-02-01Subjects: Get full text
Article -
189
Analysis of security extension protocol in e-mail system
Published 2020-12-01Subjects: Get full text
Article -
190
Trusted digital rights management protocol supporting for time and space constraint
Published 2008-01-01Subjects: Get full text
Article -
191
Openstack authentication protocol based on digital certificate
Published 2019-02-01Subjects: Get full text
Article -
192
Humanitarian commitment: Indonesia's policy on refugees’ rights to health
Published 2025-01-01Subjects: Get full text
Article -
193
Remote Interoperability Testing Client for Wireless Personal Area Network Protocol
Published 2015-11-01Subjects: Get full text
Article -
194
Improvement of the anonymity formalization based on strand space model
Published 2011-01-01Subjects: Get full text
Article -
195
-
196
Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
Published 2022-09-01Subjects: Get full text
Article -
197
Light weighted privacy protection ViT inference framework based on secret sharing
Published 2024-04-01Subjects: Get full text
Article -
198
Automatic proof of resistance of denial of service attacks in protocols
Published 2012-03-01Subjects: Get full text
Article -
199
Improvement on simulating TCP connection establishment in NS2
Published 2012-11-01Subjects: “…transmission control protocol…”
Get full text
Article -
200
USING VOICE COMMANDS TO OBTAIN EXPRESSIVE STATES FOR ANIMATRONIC STRUCTURES
Published 2022-05-01Subjects: Get full text
Article