-
201
An energy balance AODV protocol with multicast route discovery for wireless body area networks
Published 2016-08-01Subjects: Get full text
Article -
202
Research and implement of embedded wireless mobile communication system
Published 2008-01-01Subjects: Get full text
Article -
203
Monitoring approach for online security of cryptographic protocol
Published 2016-06-01Subjects: “…cryptographic protocol identification…”
Get full text
Article -
204
Efficiently non-authenticated group key management protocol withstand interruption attack
Published 2009-01-01Subjects: Get full text
Article -
205
Toward enhanced quality assurance guidelines for deep hyperthermia devices: a multi-institution study
Published 2024-12-01Subjects: Get full text
Article -
206
Efficient and privacy-preserving profile matching protocols in opportunistic networks
Published 2015-12-01Subjects: Get full text
Article -
207
-
208
Method for determining the lengths of protocol keywords based on maximum likelihood probability
Published 2016-06-01Subjects: Get full text
Article -
209
Implementation of stroke protocol: Insights from a tertiary care facility in urban India
Published 2024-04-01Subjects: Get full text
Article -
210
Meningskonstruktion under læsning af litterære tekster: Verbal Reports fra elever i læseforståelsesvanskeligheder
Published 2025-02-01Subjects: “…Verbal Protocol…”
Get full text
Article -
211
Research and application of broadband speed-up technology based on IPTV
Published 2018-07-01Subjects: “…internet protocol television…”
Get full text
Article -
212
Research on Technical Architecture on the SPICE of Open Source VDI
Published 2013-08-01Subjects: Get full text
Article -
213
Innovation Tourism Information System to Support Post-Covid-19 Health Protocols and Halal Tour in The Special Area of Yogyakarta
Published 2023-08-01Subjects: “…protocol health, covid-19 pandemic, halal tourism, tourism information system…”
Get full text
Article -
214
Moving target defense against network eavesdropping attack using POF
Published 2018-02-01Subjects: Get full text
Article -
215
Improved FSM-based method for protocol conformance testing
Published 2011-01-01Subjects: “…protocol engineering…”
Get full text
Article -
216
A chaotic digital signature algorithm based on a dynamic substitution box
Published 2025-01-01Subjects: Get full text
Article -
217
Using coverage analysis to extract Botnet command-and-control protocol
Published 2014-01-01Subjects: Get full text
Article -
218
Security analysis of security protocol Swift implementations based on computational model
Published 2018-09-01Subjects: “…security protocol…”
Get full text
Article -
219
Cooperation-based location authentication scheme for crowdsensing applications
Published 2022-09-01Subjects: “…distance-bounding protocol…”
Get full text
Article -
220
Mining and utilization of network protocol’s stealth attack behavior
Published 2017-10-01Subjects: “…protocol reverse analysis…”
Get full text
Article