Search

Your search keyword '"AKA"' showing total 1,803 results

Search Constraints

Start Over You searched for: Descriptor "AKA" Remove constraint Descriptor: "AKA"
1,803 results on '"AKA"'

Search Results

1. Does obesity predict morbidity and mortality amongst patients undergoing transfemoral amputations?

2. Lower rounds lattice-based anonymous AKA under the seCK model for the IoT.

3. A study of the roles of some immunological biomarkers in the diagnosis of rheumatoid arthritis.

4. ORIF of an intertrochanteric fracture proximal to an above-knee amputation using two AO femoral distractors

5. Performance analysis of 5GMAKA: lightweight mutual authentication and key agreement scheme for 5G network.

6. Morbidity and Mortality in Non-Obese Compared to Different Classes of Obesity in Patients Undergoing Transtibial Amputations.

7. Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications

8. ISAKA: Improved Secure Authentication and Key Agreement protocol for WBAN.

9. Enhanced Attach Procedure for Prevention of Authentication Synchronisation Failure Attack

11. Pseudonym Mutable Based Privacy for 5G User Identity.

12. Enhanced Authentication and Key Agreement Mechanism Using PKI

13. Analysis of Authentication and Key Agreement (AKA) Protocols in Long-Term Evolution (LTE) Access Network

14. A Secure, Green and Optimized Authentication and Key Agreement Protocol for IMS Network

15. An Efficient Authentication Protocol for 5G Heterogeneous Networks

18. Dynamic Module Detection in Temporal Attributed Networks of Cancers

19. Synthetic Attempts Towards Eminent Anti-viral Candidates of SARS-CoV

21. Early-stage dark treatment promotes hypocotyl elongation associated with varying effects on yield and quality in sunflower and arugula microgreens

22. State of emergency and Human Rights – the situation of Hungary

24. The Untold Secrets of WiFi-Calling Services: Vulnerabilities, Attacks, and Countermeasures

25. Methods for Host-based Intrusion Detection with Deep Learning

26. Enumeration of Clar covers of parallelogram chains

27. Constructing Expertise: Surmounting Performance Plateaus by Tasks, by Tools, and by Techniques

28. Strong Authentication for Internet Application.

29. Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications.

30. The Memory (aka Concentration) Game

31. The American Kinesiology Association Core Content for Kinesiology Programs: From Concept to Curriculum.

32. 'Władcy Gorców' — aktorzy regionalni współtworzący genius loci kulturowej przestrzeni gorczańskiej

33. Cytochrome oxidase 'blobs': a call for more anatomy

34. A grocery list learning and memory screening test: Initial performance data stratified by age and IQ

35. NEW FINANCIAL ARCHITECTURES FOR CREATIVE COMMUNITIES (NFACC) aka STRUCTURES TO MAINTAIN YOUR JOY!

36. Pharmacist’s Counselling Improves Patient Knowledge Regarding Warfarin, Irrespective of Health Literacy Level

37. I, Trolley: Self-Redirection and Hybrid Trolley Cases

38. Male Writers of Dānměi Literature: An Analysis of Fēitiānyèxiáng

39. Scleroderma associated with renal cell carcinoma: A case report and literature review

40. Teehuteatuaonoa aka ‘Jenny’, the most traveled woman on the Bounty: Chronicling female agency and island movements with Google Earth

41. THE CORRELATION BETWEEN AWARENESS AND ATTITUDE DOMAINS ON URINARY TRACT INFECTION (UTI) AMONG BURAPHA UNIVERSITY STUDENTS IN CHONBURI, THAILAND

42. Automated Quantification of Hydroxyl Reactivities: Prediction of Glycosylation Reactions

43. The Ise-e Tradition and Ise Manga

44. A grandmother's legacy. The gift that keeps on giving?

45. Throwing light on sweet syndrome and its homoeopathic perspective

46. Performance Evaluation of Certificate Based Authentication in Integrated Emerging 3G and Wi-Fi Networks

48. Consumer Technology Versus 5G

49. A blockchain-based Roadside Unit-assisted authentication and key agreement protocol for Internet of Vehicles

50. Lightweight authentication for IoT/Cloud-based forensics in intelligent data computing

Catalog

Books, media, physical & digital resources