-
121
Game theoretical routing protocol with fairness problem in wireless mesh networks
Published 2012-11-01Subjects: Get full text
Article -
122
HMGB-1 as a predictor of major bleeding requiring activation of a massive transfusion protocol in severe trauma
Published 2025-02-01Subjects: Get full text
Article -
123
Efficient secure federated learning aggregation framework based on homomorphic encryption
Published 2023-01-01Subjects: Get full text
Article -
124
Routing Protocol for Intelligent Unmanned Cluster Network Based on Node Energy Consumption and Mobility Optimization
Published 2025-01-01Subjects: Get full text
Article -
125
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01Subjects: Get full text
Article -
126
LiteST: a lightweight secure time synchronization protocol for wireless sensor networks
Published 2009-01-01Subjects: “…time synchronization protocol…”
Get full text
Article -
127
Rapid responsive and efficient multi-valued Byzantine consensus scheme
Published 2021-02-01Subjects: Get full text
Article -
128
Analysis of security extension protocol in e-mail system
Published 2020-12-01Subjects: Get full text
Article -
129
Trusted digital rights management protocol supporting for time and space constraint
Published 2008-01-01Subjects: Get full text
Article -
130
Openstack authentication protocol based on digital certificate
Published 2019-02-01Subjects: Get full text
Article -
131
Humanitarian commitment: Indonesia's policy on refugees’ rights to health
Published 2025-01-01Subjects: Get full text
Article -
132
Remote Interoperability Testing Client for Wireless Personal Area Network Protocol
Published 2015-11-01Subjects: Get full text
Article -
133
Improvement of the anonymity formalization based on strand space model
Published 2011-01-01Subjects: Get full text
Article -
134
-
135
Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
Published 2022-09-01Subjects: Get full text
Article -
136
Light weighted privacy protection ViT inference framework based on secret sharing
Published 2024-04-01Subjects: Get full text
Article -
137
Automatic proof of resistance of denial of service attacks in protocols
Published 2012-03-01Subjects: Get full text
Article -
138
Improvement on simulating TCP connection establishment in NS2
Published 2012-11-01Subjects: “…transmission control protocol…”
Get full text
Article -
139
USING VOICE COMMANDS TO OBTAIN EXPRESSIVE STATES FOR ANIMATRONIC STRUCTURES
Published 2022-05-01Subjects: Get full text
Article -
140
Validating a clinically based MS-MLPA threshold through comparison with Sanger sequencing in glioblastoma patients
Published 2025-01-01Subjects: Get full text
Article