165 results on '"Wu, Chuan-Kun"'
Search Results
2. Privacy Protection in IoT Applications
3. IoT Processing Layer Security
4. IoT Network Layer Security
5. Trust Mechanism and Key Management in IoT
6. IoT Security Architecture
7. Introduction
8. RFID System Security
9. Architectures of the Internet of Things
10. On the IT Security and the OT Security in IoT
11. A Comprehensive Set of Security Measures for IoT
12. Double iterative learning-based polynomial based-RBFNNs driven by the aid of support vector-based kernel fuzzy clustering and least absolute shrinkage deviations
13. Fuzzy clustering-based neural networks modelling reinforced with the aid of support vectors-based clustering and regularization technique
14. A privacy-preserving group encryption scheme with identity exposure
15. FSCNN: Fuzzy Channel Filter-Based Separable Convolution Neural Networks for Medical Imaging Recognition
16. Trust Mechanism and Key Management in IoT
17. A Comprehensive Set of Security Measures for IoT
18. Internet of Things Security
19. IoT Network Layer Security
20. RFID System Security
21. Privacy Protection in IoT Applications
22. IoT Security Architecture
23. On the IT Security and the OT Security in IoT
24. IoT Perception Layer Security
25. Introduction
26. Architectures of the Internet of Things
27. Fundamentals of Cryptography
28. Cryptographic Applications of Boolean Functions
29. Correlation Immunity of Boolean Functions
30. Boolean Function Representation of S-Boxes and Boolean Permutations
31. Boolean Functions and Their Walsh Transforms
32. The Symmetric Property of Boolean Functions
33. Algebraic Immunity of Boolean Functions
34. Nonlinearity Measures of Boolean Functions
35. Independence of Boolean Functions of Their Variables
36. An information transmission scheme based on secure QR code in IoT
37. Security in Cellular Networks and Communications
38. On the Existence of Multiple RSA Private Keys
39. Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting
40. Authenticated Group Key Agreement for Multicast
41. The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function
42. Differential Factoring for Integers
43. Fair Exchange of Digital Signatures with Offline Trusted Third Party
44. A hybrid encryption transmission scheme for industrial control systems
45. Boolean Functions and Their Applications in Cryptography
46. Construction of correlation immune Boolean functions
47. On construction of resilient functions
48. Security of the redefined Liaw’s broadcasting cryptosystem
49. The alignment problem of visual cryptography schemes
50. A Protocol for a Private Set-Operation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.