457 results on '"Lee, Cheng-Chi"'
Search Results
2. Anonymous quantum-safe secure and authorized communication protocol under dynamic identities for Internet of Drones
3. Accelerating QKD post-processing by secure offloading of information reconciliation
4. The impact of tumor resection on survival and functional outcomes for patients with primary central nervous system lymphoma
5. Focused ultrasound combined with radiotherapy for malignant brain tumor: a preclinical and clinical study
6. Module lattice based post quantum secure blockchain empowered vehicle to vehicle communication in the internet of vehicles
7. Machine learning assisted snort and zeek in detecting DDoS attacks in software-defined networking
8. Long-term follow-up and comparison of programmable and non-programmable ventricular cerebrospinal fluid shunts among adult patients with different hydrocephalus etiologies: a retrospective cohort study
9. Elliptic curve cryptographic image encryption using Henon map and Hopfield chaotic neural network
10. Correlation between initial tumor enlargement and magnetic resonance imaging characteristics following linear accelerator-based stereotactic radiosurgery for acoustic neuromas
11. Correction to: Focused ultrasound combined with radiotherapy for malignant brain tumor: a preclinical and clinical study
12. Rathke’s cleft cyst classification and outcomes after endoscopic endonasal approach
13. Using a continuous electrocardiographic patch with heart rhythm analysis in the subacute stage of aneurysmal subarachnoid hemorrhage: The feasibility verification
14. An improved user authentication and key agreement scheme for roaming service in ubiquitous network
15. The Prognostic Impacts of Body Mass Index and Distance to the Peritoneal Bottom on Laparoscopic Ventriculoperitoneal Shunt Placement
16. An efficient cluster head selection for wireless sensor network-based smart agriculture systems
17. Novel Fuzzy Ostrowski Integral Inequalities for Convex Fuzzy-Valued Mappings over a Harmonic Convex Set: Extending Real-Valued Intervals Without the Sugeno Integrals.
18. Novel 1,8-Naphthalimide Derivatives Inhibit Growth and Induce Apoptosis in Human Glioblastoma.
19. AutoML-ID: automated machine learning model for intrusion detection using wireless sensor network
20. The Impact of Tumor Resection on Survival and Functional Outcomes for Patients with Primary Central Nervous System Lymphoma
21. Provably secure lightweight client authentication scheme with anonymity for TMIS using chaotic hash function
22. Predictive Value of Swab Cultures for Cryopreserved Flaps During Delayed Cranioplasties
23. Deep Transfer Learning Models for Mobile-Based Ocular Disorder Identification on Retinal Images.
24. Neuropsychological performances in patients with infiltrative non-GBM gliomas after postoperative adjuvant photon or proton radiotherapy: A prospective and preliminary investigation.
25. Clinical outcomes of fractionated stereotactic radiosurgery in treating perioptic meningiomas and schwannomas: A single-institutional experience
26. Recognition of High-Grade Invasiveness and Achievement of Gross Total Resection via an Endoscopic Endonasal Transsphenoidal Approach Promise Favorable Outcomes in Growth Hormone Pituitary Adenomas: 16 Years of Experience in a Single Institute
27. On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications
28. Minimally invasive endoscopic evacuation with the novel, portable Axonpen neuroendoscopic system for spontaneous intracerebral hemorrhage
29. An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem
30. A Secure Authentication Protocol for Wireless Sensor Network in Smart Vehicular System
31. Different causes and diverse outcomes of extremely rare septic cavernous sinus thrombosis complicated with internal carotid artery stenosis
32. A novel group ownership transfer protocol for RFID systems
33. Privacy-Preserving Techniques in Cloud/Fog and Internet of Things
34. Cryptanalysis of 'An Efficient Searchable Encryption Against Keyword Guessing Attacks for Shareable Electronic Medical Records in Cloud-Based System'
35. Further Improvement on An Efficient and Secure Three-factor Based Authenticated Key Exchange Scheme Using Elliptic Curve Cryptosystems
36. An improved E-DRM scheme for mobile environments
37. Anterior Skull Base Tumor Resection by Transciliary Supraorbital Keyhole Craniotomy: A Single Institutional Experience
38. Seizures in surgically resected atypical and malignant meningiomas: Long-term outcome analysis
39. An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment
40. A Novel Group Ownership Delegate Protocol for RFID Systems
41. An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem
42. Awake craniotomies for epileptic gliomas: intraoperative and postoperative seizure control and prognostic factors
43. Machine learning assisted snort and zeek in detecting DDoS attacks in software-defined networking
44. Pressure-sensitive paint measurements on the cavity with passive control devices under transonic flow
45. Occipitocervical fusion complicated with cerebellar abscess: a case report
46. An Efficient Mobile-Healthcare Emergency Framework
47. Effectiveness of dose-escalated topiramate monotherapy and add-on therapy in neurosurgery-related epilepsy: A prospective study
48. Design Flaws in a Secure Medical Data Exchange Protocol Based on Cloud Environments
49. A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps
50. Some New Properties of Convex Fuzzy-Number-Valued Mappings on Coordinates Using Up and Down Fuzzy Relations and Related Inequalities
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.