-
301
Research on the privacy-preserving point-in-polygon protocol
Published 2016-04-01Subjects: “…oblivious point-line protocol…”
Get full text
Article -
302
Intelligent route planning method with jointing topology control of UAV swarm
Published 2024-02-01Subjects: Get full text
Article -
303
STRATEGY AND CHALLENGES OF`ECOWAS PROTOCOL ON TRADE LIBERALIZATION AND ECONOMIC DEVELOPMENT IN NIGERIA
Published 2024-10-01Subjects: Get full text
Article -
304
DEVELOPING A COST-EFFECTIVE MICROPREDATION PROTOCOL FOR TWO CARNATION (DIANTHUS CARYOPHYLLUS L.) VARIETIES UNDER IN VITRO CONDITIONS
Published 2025-01-01Subjects: Get full text
Article -
305
Design and Implementation of RF Communication Module in Intelligence Home
Published 2014-07-01Subjects: Get full text
Article -
306
Privacy-preserving federated learning framework with irregular-majority users
Published 2022-02-01Subjects: Get full text
Article -
307
Analysis of communication data of mobile terminal based on protocol reversal
Published 2018-12-01Subjects: Get full text
Article -
308
Observing documentary reading by verbal protocol
Published 2003-01-01Subjects: Get full text
Article -
309
Design and Evaluation of a Cooperative-Schedule Priority Transmission Protocol for Image Transmission in WISNs
Published 2025-01-01Subjects: “…Transmission protocol…”
Get full text
Article -
310
Research on certificateless anonymous authentication and key agreement scheme of vehicle network based on CPN
Published 2024-06-01Subjects: Get full text
Article -
311
Comprehensive Analysis of DDoS Anomaly Detection in Software-Defined Networks
Published 2025-01-01Subjects: Get full text
Article -
312
Research and implementation of multi-protocol association scheme on Uu interface in LTE-Advanced network
Published 2016-06-01Subjects: Get full text
Article -
313
Upper bound of mean-square deviation of discrete linear consensus system
Published 2016-10-01Subjects: Get full text
Article -
314
Provable secure trusted protocol for network storage
Published 2011-01-01Subjects: Get full text
Article -
315
Research on intrusion detection based on network events and deep protocol analysis
Published 2011-01-01Subjects: Get full text
Article -
316
-
317
Internet of Things Optimal Routing based on Markov-Reinforcement Learning Algorithm
Published 2024-09-01Subjects: Get full text
Article -
318
Account hijacking threat attack detection for OAuth2.0 authorization API
Published 2019-06-01Subjects: “…OAuth2.0 protocol…”
Get full text
Article -
319
Effectiveness of an HIV peer support precision matching platform: a randomized controlled trial protocol
Published 2024-10-01Subjects: Get full text
Article -
320
The Dutch version of the Dignity Therapy Question Protocol for individual Dutch nursing home residents without cognitive impairments (during COVID-19): a pilot study
Published 2025-01-01Subjects: “…Dignity therapy question protocol…”
Get full text
Article