-
161
Collusion-resistant cross-chain transaction scheme based on game theory and verifiable consensus
Published 2024-11-01Subjects: Get full text
Article -
162
Systematic review meta-analysis protocol preparation and registration – A narrative review
Published 2025-01-01Subjects: Get full text
Article -
163
Survey on privacy protection indoor positioning
Published 2023-09-01Subjects: Get full text
Article -
164
La difficile construction de la gouvernance internationale de la lutte contre les changements climatiques
Published 2012-12-01Subjects: Get full text
Article -
165
Direction Transmission Protocol of the Highway Traffic Information Assisted by Roadside-Infrastructure
Published 2013-01-01Subjects: Get full text
Article -
166
Anonymous and authenticated routing protocol for mobile ad hoc networks
Published 2009-01-01Subjects: “…authenticated routing protocol…”
Get full text
Article -
167
KiFramework — A Federated Learning Platform with an Innovative Communication Protocol
Published 2024-12-01Subjects: Get full text
Article -
168
Resident Doctors' Experiences in Breaking Bad News: The Level of Using Spikes Protocol and Related Factors
Published 2024-08-01Subjects: Get full text
Article -
169
Anticipation training for expert tennis players when facing a specific player
Published 2025-01-01Subjects: Get full text
Article -
170
Preserving data privacy in social recommendation
Published 2015-12-01Subjects: Get full text
Article -
171
Active-probing based distributed malware master detection system
Published 2013-08-01Subjects: Get full text
Article -
172
Smart low power listening for wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
173
Delay constraint supported overlay multicast routing protocol
Published 2005-01-01Subjects: Get full text
Article -
174
New MAC protocol for broadband multimedia satellite networks
Published 2006-01-01Subjects: Get full text
Article -
175
Clustering perception mining of network protocol’s stealth attack behavior
Published 2017-06-01Subjects: “…protocol reverse analysis…”
Get full text
Article -
176
Software services protection security protocol based on software watermarking in cloud environment
Published 2012-11-01Subjects: Get full text
Article -
177
Correction: Integrated different forms of business communication by using internet telephony (2017, vol.5, no.2, str.29-35)
Published 2018-01-01Subjects: Get full text
Article -
178
Design and analysis of a novel fair payment protocol in mobile environments
Published 2007-01-01Subjects: “…fair payment protocol…”
Get full text
Article -
179
Analysis and improvement of ZG off-line TTP non-repudiation protocol
Published 2009-01-01Subjects: “…fair non-repudiation protocol…”
Get full text
Article -
180
Research of authentication techniques for the Internet of things
Published 2020-07-01Subjects: Get full text
Article