Search

Your search keyword '"Chen, Abel C. H."' showing total 33 results

Search Constraints

Start Over You searched for: Author "Chen, Abel C. H." Remove constraint Author: "Chen, Abel C. H."
33 results on '"Chen, Abel C. H."'

Search Results

1. Hybrid Scheme of Post-Quantum Cryptography and Elliptic-Curve Cryptography for Certificates -- A Case Study of Security Credential Management System in Vehicle-to-Everything Communications

2. An Efficient Key Expansion Method Applied to Security Credential Management System

3. One-Time Signature Based on Pseudorandom Number Generator

4. Homomorphic Encryption Based on Lattice Post-Quantum Cryptography

5. Performance Comparison of Security Credential Management Systems for V2X: North American Standard IEEE 1609.2.1 and European Standard ETSI TS 102 941

6. EQNN: Enhanced Quantum Neural Network

7. Key Expansion Based on Internet X.509 Public Key Infrastructure for Anonymous Voting

8. Post-Quantum Cryptography Anonymous Scheme -- PQCWC: Post-Quantum Cryptography Winternitz-Chen

9. Evaluation of Hash Algorithm Performance for Cryptocurrency Exchanges Based on Blockchain System

10. X.509 Information Security Certification Based on Post-Quantum Cryptography

11. A Study on the Situation of Connected Car Patent Portfolios

12. Performance Comparison of Various Modes of Advanced Encryption Standard

13. Post-Quantum Cryptography Neural Network

14. Homomorphic Encryption Based on Post-Quantum Cryptography

15. The Security Performance Analysis of Blockchain System Based on Post-Quantum Cryptography -- A Case Study of Cryptocurrency Exchanges

16. PQCMC: Post-Quantum Cryptography McEliece-Chen Implicit Certificate Scheme

17. Evaluation and Analysis of Standard Security Technology in V2X Communication -- Exploring ECQV Implicit Certificate Cracking

18. Performance Analysis of Security Certificate Management System in Vehicle-to-Everything (V2X)

19. The Pseudonymous Certificates for Healthcare Systems

20. Research on Efficiency Analysis of Microservices

21. Similarity Calculation Based on Homomorphic Encryption

22. Exploring the Techniques of Information Security Certification

23. Homomorphic Hashing Based on Elliptic Curve Cryptography

24. How to Prove the Optimized Values of Hyperparameters for Particle Swarm Optimization?

25. Exploring the Optimized Value of Each Hyperparameter in Various Gradient Descent Algorithms

27. Similarity calculation based on homomorphic encryption.

33. Spatial–temporal feature extraction based on convolutional neural networks for travel time prediction.

Catalog

Books, media, physical & digital resources