-
141
Efficient secure federated learning aggregation framework based on homomorphic encryption
Published 2023-01-01Subjects: Get full text
Article -
142
Routing Protocol for Intelligent Unmanned Cluster Network Based on Node Energy Consumption and Mobility Optimization
Published 2025-01-01Subjects: Get full text
Article -
143
5G-based smart airport network security scheme design and security analysis
Published 2023-10-01Subjects: Get full text
Article -
144
LiteST: a lightweight secure time synchronization protocol for wireless sensor networks
Published 2009-01-01Subjects: “…time synchronization protocol…”
Get full text
Article -
145
Rapid responsive and efficient multi-valued Byzantine consensus scheme
Published 2021-02-01Subjects: Get full text
Article -
146
Analysis of security extension protocol in e-mail system
Published 2020-12-01Subjects: Get full text
Article -
147
Trusted digital rights management protocol supporting for time and space constraint
Published 2008-01-01Subjects: Get full text
Article -
148
Openstack authentication protocol based on digital certificate
Published 2019-02-01Subjects: Get full text
Article -
149
Humanitarian commitment: Indonesia's policy on refugees’ rights to health
Published 2025-01-01Subjects: Get full text
Article -
150
Remote Interoperability Testing Client for Wireless Personal Area Network Protocol
Published 2015-11-01Subjects: Get full text
Article -
151
Availability based trust evaluation model for MANET
Published 2010-01-01Subjects: Get full text
Article -
152
Quality of Service of Routing Protocols in Wireless Sensor Networks: A Review
Published 2017-01-01Subjects: Get full text
Article -
153
Improvement of the anonymity formalization based on strand space model
Published 2011-01-01Subjects: Get full text
Article -
154
-
155
Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
Published 2022-09-01Subjects: Get full text
Article -
156
Light weighted privacy protection ViT inference framework based on secret sharing
Published 2024-04-01Subjects: Get full text
Article -
157
Automatic proof of resistance of denial of service attacks in protocols
Published 2012-03-01Subjects: Get full text
Article -
158
Improvement on simulating TCP connection establishment in NS2
Published 2012-11-01Subjects: “…transmission control protocol…”
Get full text
Article -
159
USING VOICE COMMANDS TO OBTAIN EXPRESSIVE STATES FOR ANIMATRONIC STRUCTURES
Published 2022-05-01Subjects: Get full text
Article -
160
Validating a clinically based MS-MLPA threshold through comparison with Sanger sequencing in glioblastoma patients
Published 2025-01-01Subjects: Get full text
Article