246 results on '"Li, Fagen"'
Search Results
2. A hybrid approach for Android malware detection using improved multi-scale convolutional neural networks and residual networks
3. Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks
4. Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing
5. Computer vision based distributed denial of service attack detection for resource-limited devices
6. Analysis and optimization design of internal pressure resistance of flexible composite pipe
7. Traffic data extraction and labeling for machine learning based attack detection in IoT networks
8. Efficient public-key searchable encryption against inside keyword guessing attacks for cloud storage
9. A majority affiliation based under-sampling method for class imbalance problem
10. Determination on the fracture toughness of the welded joints of X80 pipeline steels based on small punch test
11. A blockchain-based privacy-preserving auditable authentication scheme with hierarchical access control for mobile cloud computing
12. Study on the effect of loading conditions on the fracture behavior of pipeline with girth weld
13. A lightweight encrypted deduplication scheme supporting backup
14. An efficient heterogeneous authenticated key agreement scheme for unmanned aerial vehicles
15. A two rounds dynamic authenticated group key agreement protocol based on LWE
16. Determination of the true stress-strain relations of high-grade pipeline steels based on small punch test correlation method
17. Offline/Online lattice-based ciphertext policy attribute-based encryption
18. Backdoor-resistant identity-based proxy re-encryption for cloud-assisted wireless body area networks
19. A two-curve model for crack arrest prediction of high-grade pipeline based on Crack Tip Opening Angle
20. A reconstruction method to determine crack length based on virtual extensometers
21. An efficient and secure certificateless searchable encryption scheme against keyword guessing attacks
22. A public key encryption scheme based on a new variant of LWE with small cipher size
23. An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification
24. Digital signature with cryptographic reverse firewalls
25. Public-key authenticated encryption with keyword search achieving both multi-ciphertext and multi-trapdoor indistinguishability
26. Certificateless authenticated key agreement for blockchain-based WBANs
27. An efficient certificateless public key encryption scheme with authorized equality test in healthcare environments
28. Certificateless public key encryption with cryptographic reverse firewalls
29. Determination of Johnson–Cook parameters and evaluation of Charpy impact test performance for X80 pipeline steel
30. An efficient identity-based signature scheme without bilinear pairing for vehicle-to-vehicle communication in VANETs
31. A cloud data deduplication scheme based on certificateless proxy re-encryption
32. A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud
33. Guest editorial: Special issue on frontiers in cyber security
34. A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs
35. An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid
36. Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement
37. Solving Restricted Preemptive Scheduling on Parallel Machines with SAT and PMS
38. Permeability Model of Liquid Microcapsule Based on Multiple Linear Regression Method
39. High-density genetic linkage mapping reveals low stability of QTLs across environments for economic traits in Eucalyptus
40. α-Fe2O3@C nanorings as anode materials for high performance lithium ion batteries
41. Magnetic anisotropy and one-dimensionality finite-size scaling law in polycrystalline Ni nanowire arrays
42. Multiparty Threshold Private Set Intersection Protocol with Low Communication Complexity
43. Xylem Transcriptome Analysis in Contrasting Wood Phenotypes of Eucalyptus urophylla × tereticornis Hybrids
44. Mechanism of Action of Yin Nourishing and Heat Clearing Prescription in Treating Cough Variant Asthma Based on Network Pharmacology and Molecular Docking Verification
45. Certificateless threshold signature secure in the standard model
46. Identity-based partially blind signature in the standard model for electronic cash
47. Secure identity-based signcryption in the standard model
48. New identity-based three-party authenticated key agreement protocol with provable security
49. Certificateless hybrid signcryption
50. An efficient certificateless aggregate signature with constant pairing computations
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.