Search

Your search keyword '"Server-side"' showing total 1,977 results

Search Constraints

Start Over You searched for: Descriptor "Server-side" Remove constraint Descriptor: "Server-side"
1,977 results on '"Server-side"'

Search Results

1. Detecting Electrocardiogram Arrhythmia Empowered With Weighted Federated Learning

2. Detecting and predicting countermeasures against clickjacking.

3. Client Applications and Server-Side Docker for Management of RNASeq and/or VariantSeq Workflows and Pipelines of the GPRO Suite.

5. An Application of Web-based E-Healthcare Management System Using ASP.Net.

6. Privacy-Preserving and Secure Cloud Computing: A Case of Large-Scale Nonlinear Programming

7. Client applications and server-side docker for management of RNASeq and/or VariantSeq workflows and pipelines of the GPRO suite

8. Client Applications and Server-Side Docker for Management of RNASeq and/or VariantSeq Workflows and Pipelines of the GPRO Suite

9. Edge-Centric Programming for IoT Applications With Automatic Code Partitioning

10. Federated FCM: Clustering Under Privacy Requirements

11. Client Selection for Federated Learning With Label Noise

12. Energy-efficient and secure mobile fog-based cloud for the Internet of Things

13. BOEW: A Content-Based Image Retrieval Scheme Using Bag-of-Encrypted-Words in Cloud Computing

14. Research on the optimum synchronous network search data extraction based on swarm intelligence algorithm

15. Fed-IIoT: A Robust Federated Malware Detection Architecture in Industrial IoT

16. Provably Secure Authentication Protocol for Mobile Clients in IoT Environment Using Puncturable Pseudorandom Function

18. Design and Implementation of Wireless Environment Monitoring System Based on STM32

19. Successive Point-of-Interest Recommendation With Personalized Local Differential Privacy

20. Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter

21. Transparent Multipath: Using Double MPTCP Proxies to Enhance Transport Performance for Traditional TCP

22. A privacy-preserving aggregation scheme based on negative survey for vehicle fuel consumption data

23. IoT security system with modified Zero Knowledge Proof algorithm for authentication

24. Location Privacy Protection Scheme for LBS in IoT

25. Server Side Method to Detect and Prevent Stored XSS Attack

26. A Highly Efficient ECC-Based Authentication Protocol for RFID

27. Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection

29. Transferable face image privacy protection based on federated learning and ensemble models

30. Achieving Privacy Preservation and Billing via Delayed Information Release

31. The design, implementation and pilot application of an intelligent online proctoring system for online exams

32. Server-Side Template Injection with Custom Exploit

33. Subdomain Takeover : A Challenge as Web App Vulnerability or Server-Side Vulnerability

34. Optimization of an Intelligent Music-Playing System Based on Network Communication

35. An Application of Web-based E-Healthcare Management System Using ASP.Net

36. Confused-Modulo-Projection-Based Somewhat Homomorphic Encryption—Cryptosystem, Library, and Applications on Secure Smart Cities

37. AdSherlock: Efficient and Deployable Click Fraud Detection for Mobile Applications

38. Privacy-preserving biometric verification with outsourced correlation filter computation

39. GENERATOR WEB APLIKACIJA BAZIRANIH NA ANGULARJS I SPRING RAZVOJNIM OKVIRIMA

40. RAZVOJ APLIKACIJE ZA PRAĆENJE BILANSA MAKRONUTRIJENATA

41. An energy-saving video compression targeting face recognition of disaster victim

42. APLIKASI RETENSI REKAM MEDIS MENGGUNAKAN MICROSOFT ACCESS

43. Designing RESTful API for the e-procurement system in private sector

44. An Approach to Establishing Simultaneous Server-Side Connections for NFC/Bluetooth enabled Quiz Management Systems

45. HTTP-Request Classification in Automatic Web Application Crawling

46. Cookies from the Past

47. Autenticación de usuarios en aplicaciones empresariales mediante Spring Security

48. Large Scale Fault Data Analysis and OSS Reliability Assessment Based on Quantification Method of the First Type

49. Analyzing User-Level Privacy Attack Against Federated Learning

50. A Crowd-Sensing Framework for Allocation of Time-Constrained and Location-Based Tasks

Catalog

Books, media, physical & digital resources