-
61
Relay-based cooperative MAC protocol with rate adaptation
Published 2017-10-01Subjects: Get full text
Article -
62
SSMCI:verification mechanism for security protocols centered on the attacker
Published 2017-10-01Subjects: “…security protocol…”
Get full text
Article -
63
Efficient identification protocol provably secure in standard model
Published 2009-01-01Subjects: “…identification protocol…”
Get full text
Article -
64
Temperature Estimation of Smart Homes with Sensors in Internet of Things Environment based on Block Chain
Published 2023-03-01Subjects: Get full text
Article -
65
Hybrid and Multi-Hop Advanced Zonal-Stable Election Protocol for Wireless Sensor Networks
Published 2019-01-01Subjects: Get full text
Article -
66
Authentication method in SWIM based on improved Diameter/EAP-MD5
Published 2014-08-01Subjects: Get full text
Article -
67
Protocol for assessing immune-target cell interactions using a single-cell cytotoxicity assay
Published 2025-03-01Subjects: Get full text
Article -
68
-
69
Reproductive Efficiency of Nelore Cows in Fixed-Time Artificial Insemination Programs with Early Resynchronization
Published 2025-01-01Subjects: Get full text
Article -
70
Use of the consort-ai protocol in reporting artificial intelligence applications in clinical trials
Published 2022-06-01Subjects: Get full text
Article -
71
UWSP: sleeping algorithms for underwater sensor network
Published 2013-08-01Subjects: Get full text
Article -
72
Researches on efficient transmission protocol for multi-cell system based on interference toleration
Published 2016-05-01Subjects: Get full text
Article -
73
Research on DoS detection and reaction of SIP application
Published 2010-01-01Subjects: “…session initial protocol…”
Get full text
Article -
74
Utilizing ATLS® Trauma Management Protocols: The Gold Standard for Safe and Effective Care.
Published 2025-01-01Subjects: Get full text
Article -
75
Research and Implementation of SlAP Monitor in LTE Network
Published 2013-01-01Subjects: Get full text
Article -
76
Trusted and anonymous authentication scheme for wireless networks
Published 2009-01-01Subjects: “…wireless authentication protocols…”
Get full text
Article -
77
Method of detecting IRC Botnet based on the multi-features of traffic flow
Published 2013-10-01Subjects: “…IRC protocol…”
Get full text
Article -
78
Kasr-Al-Ainy cutaneous lymphoma unit protocol for management of mycosis fungoides
Published 2024-01-01Subjects: Get full text
Article -
79
-
80
HIPSCS:secure IP communication system based on HIP
Published 2012-11-01Subjects: “…host identity protocol…”
Get full text
Article