Journal articles on the topic 'Group-based schemes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Group-based schemes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bernardini, Riccardo, Roberto Cesco Fabbro, and Roberto Rinaldo. "Group-Based Reduction Schemes for Streaming Applications." ISRN Communications and Networking 2011 (September 8, 2011): 1–10. http://dx.doi.org/10.5402/2011/898254.
Full textGohar, Moneeb, Hind Ahmed M. Alrubaish, Ruba Suliman M. Alowaid, and Jin-Ghoo Choi. "Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/4180801.
Full textPerera, Maharage Nisansala Sevwandi, and Takeshi Koshiba. "Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation." Cryptography 4, no. 4 (November 30, 2020): 33. http://dx.doi.org/10.3390/cryptography4040033.
Full textAprahamian, Hrayer, Ebru K. Bish, and Douglas R. Bish. "Static Risk-Based Group Testing Schemes Under Imperfectly Observable Risk." Stochastic Systems 10, no. 4 (December 2020): 361–90. http://dx.doi.org/10.1287/stsy.2019.0059.
Full textMeshram, Chandrashekhar, Agbotiname Lucky Imoize, Amer Aljaedi, Adel R. Alharbi, Sajjad Shaukat Jamal, and Sharad Kumar Barve. "An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps." Sensors 21, no. 21 (October 23, 2021): 7039. http://dx.doi.org/10.3390/s21217039.
Full textChen, F. L., and Z. F. Han. "Quantum group signature scheme based on controlled quantum teleportation." International Journal of Quantum Information 14, no. 08 (December 2016): 1650041. http://dx.doi.org/10.1142/s0219749916500416.
Full textAprahamian, Hrayer, Douglas R. Bish, and Ebru K. Bish. "Optimal Risk-Based Group Testing." Management Science 65, no. 9 (September 2019): 4365–84. http://dx.doi.org/10.1287/mnsc.2018.3138.
Full textMa, Li Zhen. "Improved VLR Group Signature Based on DTDH Assumption." Advanced Engineering Forum 6-7 (September 2012): 520–24. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.520.
Full textKang, Hyung-Woo, and Seok-Joo Koh. "Enhanced group communication in constrained application protocol–based Internet-of-things networks." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771877279. http://dx.doi.org/10.1177/1550147718772793.
Full textCao, Liling, Mei Liang, Zheng Zhang, and Shouqi Cao. "Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECC." Wireless Communications and Mobile Computing 2022 (December 5, 2022): 1–16. http://dx.doi.org/10.1155/2022/7519688.
Full textLiu, Dawei, Zhigen Hu, and Wencheng Guo. "Multi-Attribute Group-Decision on a Construction Diversion Scheme for Hydropower Projects Based on Perception Utility." Energies 11, no. 11 (November 4, 2018): 3027. http://dx.doi.org/10.3390/en11113027.
Full textGuo, Jingjing, and Jiacong Sun. "Secure and Practical Group Nearest Neighbor Query for Location-Based Services in Cloud Computing." Security and Communication Networks 2021 (September 25, 2021): 1–17. http://dx.doi.org/10.1155/2021/5686506.
Full textB. R., Purushothama, and B. B. Amberker. "Secure group and multi-layer group communication schemes based on polynomial interpolation." Security and Communication Networks 6, no. 6 (August 29, 2012): 735–56. http://dx.doi.org/10.1002/sec.607.
Full textWang, Luping, Kai Zhang, Haifeng Qian, and Jie Chen. "Group Signature with Verifier-Local Revocation Based on Coding Theory." Security and Communication Networks 2021 (August 20, 2021): 1–12. http://dx.doi.org/10.1155/2021/3259767.
Full textEzerman, Martianus Frederic, Hyung Tae Lee, San Ling, Khoa Nguyen, and Huaxiong Wang. "Provably Secure Group Signature Schemes From Code-Based Assumptions." IEEE Transactions on Information Theory 66, no. 9 (September 2020): 5754–73. http://dx.doi.org/10.1109/tit.2020.2976073.
Full textSeong, Jin-Taek. "Group Testing-Based Robust Algorithm for Diagnosis of COVID-19." Diagnostics 10, no. 6 (June 11, 2020): 396. http://dx.doi.org/10.3390/diagnostics10060396.
Full textWang, Hong, Jianhua Li, Feng Zhu, and Zhe Wang. "Asynchronous Group Authentication Based on Geometric Approach." Security and Communication Networks 2018 (December 5, 2018): 1–9. http://dx.doi.org/10.1155/2018/5289383.
Full textLin, Chia-Chen, Chin-Chen Chang, and Yao-Zhu Zheng. "A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation." Symmetry 12, no. 12 (December 5, 2020): 2009. http://dx.doi.org/10.3390/sym12122009.
Full textBegum, S. Jabeen, and T. Purusothaman. "Hierarchical Tree Structure Based Clustering Schemes for Secure Group Communication." Mobile Networks and Applications 21, no. 3 (September 12, 2015): 550–60. http://dx.doi.org/10.1007/s11036-015-0649-5.
Full textTahat, Nedal, and Ashraf A. Tahat. "Identity-based threshold group signature scheme based on multiple hard number theoretic problems." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 3695. http://dx.doi.org/10.11591/ijece.v10i4.pp3695-3701.
Full textLi, Yan, Hui Min Li, and Yi Li. "Schemes Selection of Yarn Tension Detection and Control Based on Fuzzy Multiple Attribute Group Decision Making." Advanced Materials Research 694-697 (May 2013): 2829–34. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2829.
Full textChen, Qingnan, Ting Wu, Chengnan Hu, Anbang Chen, and Qiuhua Zheng. "An Identity-Based Cross-Domain Authenticated Asymmetric Group Key Agreement." Information 12, no. 3 (March 5, 2021): 112. http://dx.doi.org/10.3390/info12030112.
Full textMa, Chunguang, Lei Zhang, Songtao Yang, and Xiaodong Zheng. "Hiding Yourself Behind Collaborative Users When Using Continuous Location-Based Services." Journal of Circuits, Systems and Computers 26, no. 07 (March 17, 2017): 1750119. http://dx.doi.org/10.1142/s0218126617501195.
Full textÇalkavur, Selda. "A Study on Multisecret-Sharing Schemes Based on Linear Codes." Emerging Science Journal 4, no. 4 (August 1, 2020): 263–71. http://dx.doi.org/10.28991/esj-2020-01229.
Full textHou, Yuan Hang, Sheng Huang, Yu Long Hu, Xiang Yin Meng, Wen Quan Wang, and Chao Wang. "Group Decision Making of Naval Ship Principal Dimensions Based on PSO Algorithm." Advanced Materials Research 201-203 (February 2011): 1233–37. http://dx.doi.org/10.4028/www.scientific.net/amr.201-203.1233.
Full textZhu, Jianhua, Guohua Cui, and Shiyang Zhou. "Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings." International Journal of Information Technology and Computer Science 1, no. 1 (October 18, 2009): 16–22. http://dx.doi.org/10.5815/ijitcs.2009.01.03.
Full textHarn, Lein, Chingfang Hsu, and Zhe Xia. "Lightweight group key distribution schemes based on pre-shared pairwise keys." IET Communications 14, no. 13 (August 11, 2020): 2162–65. http://dx.doi.org/10.1049/iet-com.2019.1345.
Full textDuran Diaz, R., L. Hernandez Encinas, and J. Munoz Masque. "Two proposals for group signature schemes based on number theory problems." Logic Journal of IGPL 21, no. 4 (August 17, 2012): 648–58. http://dx.doi.org/10.1093/jigpal/jzs035.
Full textZhang, Su-Ying, and Zi-Chen Deng. "Group preserving schemes for nonlinear dynamic system based on RKMK methods." Applied Mathematics and Computation 175, no. 1 (April 2006): 497–507. http://dx.doi.org/10.1016/j.amc.2005.07.062.
Full textŞahin, Meryem Soysaldı, and Sedat Akleylek. "A survey of quantum secure group signature schemes: Lattice-based approach." Journal of Information Security and Applications 73 (March 2023): 103432. http://dx.doi.org/10.1016/j.jisa.2023.103432.
Full textWang, Gang, Jiayin Feng, Guolin Li, Jinling Song, and Dongyan Jia. "Energy Consumption and QoS Optimization Coverage Mechanism in Wireless Sensor Networks Based on Swarm Sensing Algorithm." Journal of Sensors 2022 (September 28, 2022): 1–11. http://dx.doi.org/10.1155/2022/4908978.
Full textLi, Shangle, Ruili Yang, and Jiageng Chen. "A Privacy-Preserving Authentication Scheme for VANETs with Exculpability." Security and Communication Networks 2023 (February 7, 2023): 1–12. http://dx.doi.org/10.1155/2023/8676929.
Full textLiu, Hui, Peng Wang, Teyang Zhao, Zhenggang Fan, and Houlin Pan. "A Group-Based Droop Control Strategy Considering Pitch Angle Protection to Deloaded Wind Farms." Energies 15, no. 8 (April 8, 2022): 2722. http://dx.doi.org/10.3390/en15082722.
Full textGohar, Moneeb, Jin-Ghoo Choi, and Seok-Joo Koh. "An ID/Locator Separation Based Group Mobility Management in Wireless Body Area Network." Journal of Sensors 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/537205.
Full textGuo, Yusheng, Xingxing Jia, Qimeng Chu, and Daoshun Wang. "A Novel XOR-Based Threshold Visual Cryptography with Adjustable Pixel Expansion." Applied Sciences 10, no. 4 (February 15, 2020): 1321. http://dx.doi.org/10.3390/app10041321.
Full textZhou, Guomin, Peng Zeng, Xiaohui Yuan, Siyuan Chen, and Kim-Kwang Raymond Choo. "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model." Security and Communication Networks 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/1915239.
Full textMohamad, Mohd Saiful Adli. "Threshold-directed signature scheme based on hybrid number theoretic problems." Asian-European Journal of Mathematics 13, no. 05 (April 4, 2019): 2050098. http://dx.doi.org/10.1142/s1793557120500989.
Full textEpprecht, Eugenio Kahn, Laura França Marques Barbosa, and Bruno Francisco Teixeira Simões. "SPC of multiple stream processes: a chart for enhanced detection of shifts in one stream." Production 21, no. 2 (April 29, 2011): 242–53. http://dx.doi.org/10.1590/s0103-65132011005000022.
Full textShen, Shiqi, Hui Wang, Mengqiu Li, Yaojing Feng, and Yichang Zhong. "Torque-Enhanced Phase Current Detection Schemes for Multiphase Switched Reluctance Motors with Reduced Sensors." Applied Sciences 12, no. 12 (June 11, 2022): 5956. http://dx.doi.org/10.3390/app12125956.
Full textAl-shareeda, Mahmood A., Mohammed Anbar, Selvakumar Manickam, and Iznan H. Hasbullah. "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network." Symmetry 12, no. 10 (October 14, 2020): 1687. http://dx.doi.org/10.3390/sym12101687.
Full textFerre, Guillaume, and Jean-pierre Cances. "New Layered Space-Time Schemes Based on Group of Three Transmit Antenna." IEEE Communications Letters 12, no. 1 (January 2008): 38–40. http://dx.doi.org/10.1109/lcomm.2008.071611.
Full textMiao, Ying, and Sanpei Kageyama. "Two classes of q-ary codes based on group divisible association schemes." Discrete Mathematics 195, no. 1-3 (January 1999): 269–76. http://dx.doi.org/10.1016/s0012-365x(98)00186-1.
Full textWang, Jun Ying, De Hua Li, and Shi Hong Wu. "Study on Divergence Based on the Grey Relational Degree in the Group Decision-Making." Applied Mechanics and Materials 29-32 (August 2010): 1168–74. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.1168.
Full textZhang, Yu, Lei You, and Yin Li. "Tree-Based Public Key Encryption with Conjunctive Keyword Search." Security and Communication Networks 2021 (November 5, 2021): 1–16. http://dx.doi.org/10.1155/2021/7034944.
Full textChande, Manoj Kumar, and Balwant Singh Thakur. "Proxy-Protected Proxy Multi-Signature Based on Elliptic Curve." International Journal of Informatics and Communication Technology (IJ-ICT) 3, no. 1 (April 1, 2014): 67. http://dx.doi.org/10.11591/ijict.v3i1.pp67-72.
Full textSun, Mei, Yuyan Guo, Dongbing Zhang, and MingMing Jiang. "Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks." Complexity 2021 (May 4, 2021): 1–13. http://dx.doi.org/10.1155/2021/5526412.
Full textLi, Xiaoping, Hefeng Chen, Yanjun Liu, and Chin-Chen Chang. "Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem." Security and Communication Networks 2020 (July 14, 2020): 1–8. http://dx.doi.org/10.1155/2020/6073721.
Full textLee, Jiwon, Seunghwa Lee, Jihye Kim, and Hyunok Oh. "Scalable Wildcarded Identity-Based Encryption with Full Security." Electronics 9, no. 9 (September 6, 2020): 1453. http://dx.doi.org/10.3390/electronics9091453.
Full textMeena, Ritu, and Sonajharia Minz. "Group Recommender Systems – An Evolutionary Approach Based on Multi-expert System for Consensus." Journal of Intelligent Systems 29, no. 1 (November 20, 2018): 1092–108. http://dx.doi.org/10.1515/jisys-2018-0081.
Full textDEMİRCİ, Niymet, Ülkü ÇOBAN SURAL, and Neşe IŞIK TERTEMİZ. "A Study on the Proofs Used by Primary Education Teacher Candidates in Circumference Problem Solutions and Instructional Explanations." International Journal of Psychology and Educational Studies 9 (October 23, 2022): 1027–46. http://dx.doi.org/10.52380/ijpes.2022.9.4.782.
Full text