577 results on '"Wu, Tsu-Yang"'
Search Results
2. Fick’s Law Algorithm with Gaussian Mutation: Design and Analysis
3. Barnacle Growth Algorithm (BGA): A New Bio-Inspired Metaheuristic Algorithm for Solving Optimization Problems
4. Security Analysis of Two Authentication and Key Agreement Protocols Based on Wireless Sensor Networks
5. Comments on 'Two Authentication and Key Agreement Protocols in WSN Environments'
6. To Analyze Security Requirements of Two AKA Protocols in WBAN and VANET
7. A Hybrid Orthogonal Learning and QUATRE Algorithm Based on PPE Algorithm
8. Rotating behind security: an enhanced authentication protocol for IoT-enabled devices in distributed cloud computing architecture
9. Comments on 'A Robust User Authentication Protocol with Privacy-Preserving for Roaming Service in Mobility Environments'
10. Security Analysis of Two Authentication and Key Agreement Protocols Based on Wireless Sensor Networks
11. To Analyze Security Requirements of Two AKA Protocols in WBAN and VANET
12. Comments on “Two Authentication and Key Agreement Protocols in WSN Environments”
13. A Hybrid Orthogonal Learning and QUATRE Algorithm Based on PPE Algorithm
14. Comments on a Secure AKA Scheme for Multi-server Environments
15. Comments on a Secure and Efficient Three-Factor Authentication Protocol Using Honey List for WSN
16. Cryptanalysis of an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment
17. Image Encryption with Logistic Chaotic Model Using C-QUATRE Algorithm
18. On the Security of a Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks
19. TDOA Location Based on Pigeon-Inspired Optimization Algorithm in WSNs
20. An Improved Median Filter Method Based on Multi-directional Template Combined with Image Feature
21. A provably secure lightweight authentication protocol in mobile edge computing environments
22. Cryptanalysis of a Pairing-based Authentication Scheme for Smart Grid Communications
23. Cryptanalysis of an Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System
24. Cryptanalysis and Improvement of a Remote Three-Factor Authentication Protocol for the Multi-server Environment
25. Hierarchical Semantic Approximate Multi-keyword Ranked Search over Encrypted Data
26. Image Encryption with Logistic Chaotic Model Using C-QUATRE Algorithm
27. On the Security of a Lightweight Three-Factor-Based User Authentication Protocol for Wireless Sensor Networks
28. Cryptanalysis of an Authentication Protocol for IoT-Enabled Devices in Distributed Cloud Computing Environment
29. Comments on a Secure AKA Scheme for Multi-server Environments
30. Comments on a Secure and Efficient Three-Factor Authentication Protocol Using Honey List for WSN
31. A Spectral Convolutional Neural Network Model Based on Adaptive Fick’s Law for Hyperspectral Image Classification
32. Cryptanalysis of a Pairing-Based Anonymous Key Agreement Scheme for Smart Grid
33. A Collusion Attack on Identity-Based Public Auditing Scheme via Blockchain
34. Cryptanalysis of an Anonymous Message Authentication Scheme for Smart Grid
35. Cryptanalysis of an Anonymous Mutual Authentication Scheme in Mobile Networks
36. A Lightweight Anonymous Mutual Authentication Scheme in Mobile Networks
37. Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
38. Comments on “A Robust User Authentication Protocol with Privacy-Preserving for Roaming Service in Mobility Environments”
39. An Improved Median Filter Method Based on Multi-directional Template Combined with Image Feature
40. An enhanced pairing-based authentication scheme for smart grid communications
41. Security Analysis of a Public Key Authenticated Encryption with Keyword Search Scheme
42. On the Security of a Three Factor Remote User Authentication Scheme Using Fuzzy Extractor
43. Construct Left Ventricular Hypertrophy Prediction Model Based on Random Forest
44. A Public Auditing Scheme with Data Recovery
45. A Simple Image Encryption Algorithm Based on Logistic Map
46. Cryptanalysis of an Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System
47. Cryptanalysis of a Pairing-based Authentication Scheme for Smart Grid Communications
48. Efficient Mining of High Average-Utility Itemsets with Multiple Thresholds
49. Cryptanalysis of an Anonymous Mutual Authentication Scheme for Secure Inter-device Communication in Mobile Networks
50. On the Security of a Certificateless Public Key Encryption with Keyword Search
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.