-
661
A hierarchical access control scheme based on Lagrange interpolation for mobile agents
Published 2018-07-01Get full text
Article -
662
An Efficient Adaptive Anticollision Algorithm Based on 4-Ary Pruning Query Tree
Published 2013-12-01Get full text
Article -
663
Efficient data possession–checking protocol with deduplication in cloud
Published 2017-08-01Get full text
Article -
664
Robust Indoor Sensor Localization Using Signatures of Received Signal Strength
Published 2013-12-01Get full text
Article -
665
A QoS Model for a RFID Enabled Application with Next-Generation Sensors for Manufacturing Systems
Published 2013-11-01Get full text
Article -
666
Consensus Achievement of Decentralized Sensors Using Adapted Particle Swarm Optimization Algorithm
Published 2014-04-01Get full text
Article -
667
Multiscale Structural Health Monitoring of Cable-Anchorage System Using Piezoelectric PZT Sensors
Published 2013-11-01Get full text
Article -
668
Holes Detection in Anisotropic Sensornets: Topological Methods
Published 2012-10-01Get full text
Article -
669
Safety of Systems Integrating Fire Protection Equipment – Risks, Gaps, Recommendations
Published 2024-12-01Get full text
Article -
670
A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System
Published 2016-03-01Get full text
Article -
671
Correction of Nonlinear Frequency Sweep in Frequency-Modulated Continuous-Wave Laser Range Sensor
Published 2013-06-01Get full text
Article -
672
Ant-Based Swarm Algorithm for Charging Coordination of Electric Vehicles
Published 2013-05-01Get full text
Article -
673
Post quantum proxy signature scheme based on the multivariate public key cryptographic signature
Published 2020-04-01Get full text
Article -
674
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing
Published 2014-01-01Get full text
Article -
675
-
676
Distributed robust Volt-VAr control strategy for accurate reactive power sharing in islanded microgrid
Published 2025-01-01Get full text
Article -
677
Fine-Grained Support of Security Services for Resource Constrained Internet of Things
Published 2016-05-01Get full text
Article -
678
THE APPLICATION OF IOT (INTERNET OF THINGS) FOR SMART HOUSING ENVIRONMENTS AND INTEGRATED ECOSYSTEMS
Published 2020-06-01Get full text
Article -
679
Internet of Vehicles: From intelligent grid to autonomous cars and vehicular fogs
Published 2016-09-01Get full text
Article -
680
Adaptive duty cycle control–based opportunistic routing scheme to reduce delay in cyber physical systems
Published 2019-04-01Get full text
Article