Search

Your search keyword '"Abel C"' showing total 1,570 results

Search Constraints

Start Over You searched for: Author "Abel C" Remove constraint Author: "Abel C"
1,570 results on '"Abel C"'

Search Results

4. Hybrid Scheme of Post-Quantum Cryptography and Elliptic-Curve Cryptography for Certificates -- A Case Study of Security Credential Management System in Vehicle-to-Everything Communications

5. An Efficient Key Expansion Method Applied to Security Credential Management System

6. One-Time Signature Based on Pseudorandom Number Generator

7. Homomorphic Encryption Based on Lattice Post-Quantum Cryptography

8. Performance Comparison of Security Credential Management Systems for V2X: North American Standard IEEE 1609.2.1 and European Standard ETSI TS 102 941

9. Peer pressure and substance use as predictors of mental health among in-school adolescents in Nigeria

10. EQNN: Enhanced Quantum Neural Network

11. Generating a highly uniform magnetic field inside the magnetically shielded room of the n2EDM experiment

12. Key Expansion Based on Internet X.509 Public Key Infrastructure for Anonymous Voting

13. Post-Quantum Cryptography Anonymous Scheme -- PQCWC: Post-Quantum Cryptography Winternitz-Chen

14. Methodologies for preparation of prokaryotic extracts for cell-free expression systems

15. Evaluation of Hash Algorithm Performance for Cryptocurrency Exchanges Based on Blockchain System

16. X.509 Information Security Certification Based on Post-Quantum Cryptography

17. A Study on the Situation of Connected Car Patent Portfolios

18. Eccentricity Failure Detection of Brushless DC Motors From Sound Signals Based on Density of Maxima

19. Performance Comparison of Various Modes of Advanced Encryption Standard

20. Noninvasive Methods for Fault Detection and Isolation in Internal Combustion Engines Based on Chaos Analysis

21. Are the timings and risk factors changing? Survival analysis of timing of first antenatal care visit among pregnant women in Nigeria (2003–2013)

22. Post-Quantum Cryptography Neural Network

23. Homomorphic Encryption Based on Post-Quantum Cryptography

24. The Security Performance Analysis of Blockchain System Based on Post-Quantum Cryptography -- A Case Study of Cryptocurrency Exchanges

25. PQCMC: Post-Quantum Cryptography McEliece-Chen Implicit Certificate Scheme

26. Simulation experiences of paramedic students: a cross-cultural examination

28. Evaluation and Analysis of Standard Security Technology in V2X Communication -- Exploring ECQV Implicit Certificate Cracking

29. Performance Analysis of Security Certificate Management System in Vehicle-to-Everything (V2X)

30. A large 'Active Magnetic Shield' for a high-precision experiment

31. The Pseudonymous Certificates for Healthcare Systems

32. Research on Efficiency Analysis of Microservices

33. Statistical sensitivity of the nEDM apparatus at PSI to n − n′ oscillations

34. nEDM experiment at PSI: Data-taking strategy and sensitivity of the dataset

35. The n2EDM experiment at the Paul Scherrer Institute

36. A Novel Approach for Brushless DC Motors Characterization in Drones Based on Chaos

37. Similarity Calculation Based on Homomorphic Encryption

38. Exploring the Techniques of Information Security Certification

39. Homomorphic Hashing Based on Elliptic Curve Cryptography

40. How to Prove the Optimized Values of Hyperparameters for Particle Swarm Optimization?

41. Exploring the Optimized Value of Each Hyperparameter in Various Gradient Descent Algorithms

42. Search for ultralight axion dark matter in a side-band analysis of a 199Hg free-spin precession signal

44. Mapping of the magnetic field to correct systematic effects in a neutron electric dipole moment experiment

45. A search for neutron to mirror-neutron oscillations

Catalog

Books, media, physical & digital resources