Artículos de revistas sobre el tema "Group-based schemes"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Group-based schemes".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Bernardini, Riccardo, Roberto Cesco Fabbro y Roberto Rinaldo. "Group-Based Reduction Schemes for Streaming Applications". ISRN Communications and Networking 2011 (8 de septiembre de 2011): 1–10. http://dx.doi.org/10.5402/2011/898254.
Texto completoGohar, Moneeb, Hind Ahmed M. Alrubaish, Ruba Suliman M. Alowaid y Jin-Ghoo Choi. "Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks". Wireless Communications and Mobile Computing 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/4180801.
Texto completoPerera, Maharage Nisansala Sevwandi y Takeshi Koshiba. "Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation". Cryptography 4, n.º 4 (30 de noviembre de 2020): 33. http://dx.doi.org/10.3390/cryptography4040033.
Texto completoAprahamian, Hrayer, Ebru K. Bish y Douglas R. Bish. "Static Risk-Based Group Testing Schemes Under Imperfectly Observable Risk". Stochastic Systems 10, n.º 4 (diciembre de 2020): 361–90. http://dx.doi.org/10.1287/stsy.2019.0059.
Texto completoMeshram, Chandrashekhar, Agbotiname Lucky Imoize, Amer Aljaedi, Adel R. Alharbi, Sajjad Shaukat Jamal y Sharad Kumar Barve. "An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps". Sensors 21, n.º 21 (23 de octubre de 2021): 7039. http://dx.doi.org/10.3390/s21217039.
Texto completoChen, F. L. y Z. F. Han. "Quantum group signature scheme based on controlled quantum teleportation". International Journal of Quantum Information 14, n.º 08 (diciembre de 2016): 1650041. http://dx.doi.org/10.1142/s0219749916500416.
Texto completoAprahamian, Hrayer, Douglas R. Bish y Ebru K. Bish. "Optimal Risk-Based Group Testing". Management Science 65, n.º 9 (septiembre de 2019): 4365–84. http://dx.doi.org/10.1287/mnsc.2018.3138.
Texto completoMa, Li Zhen. "Improved VLR Group Signature Based on DTDH Assumption". Advanced Engineering Forum 6-7 (septiembre de 2012): 520–24. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.520.
Texto completoKang, Hyung-Woo y Seok-Joo Koh. "Enhanced group communication in constrained application protocol–based Internet-of-things networks". International Journal of Distributed Sensor Networks 14, n.º 4 (abril de 2018): 155014771877279. http://dx.doi.org/10.1177/1550147718772793.
Texto completoCao, Liling, Mei Liang, Zheng Zhang y Shouqi Cao. "Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECC". Wireless Communications and Mobile Computing 2022 (5 de diciembre de 2022): 1–16. http://dx.doi.org/10.1155/2022/7519688.
Texto completoLiu, Dawei, Zhigen Hu y Wencheng Guo. "Multi-Attribute Group-Decision on a Construction Diversion Scheme for Hydropower Projects Based on Perception Utility". Energies 11, n.º 11 (4 de noviembre de 2018): 3027. http://dx.doi.org/10.3390/en11113027.
Texto completoGuo, Jingjing y Jiacong Sun. "Secure and Practical Group Nearest Neighbor Query for Location-Based Services in Cloud Computing". Security and Communication Networks 2021 (25 de septiembre de 2021): 1–17. http://dx.doi.org/10.1155/2021/5686506.
Texto completoB. R., Purushothama y B. B. Amberker. "Secure group and multi-layer group communication schemes based on polynomial interpolation". Security and Communication Networks 6, n.º 6 (29 de agosto de 2012): 735–56. http://dx.doi.org/10.1002/sec.607.
Texto completoWang, Luping, Kai Zhang, Haifeng Qian y Jie Chen. "Group Signature with Verifier-Local Revocation Based on Coding Theory". Security and Communication Networks 2021 (20 de agosto de 2021): 1–12. http://dx.doi.org/10.1155/2021/3259767.
Texto completoEzerman, Martianus Frederic, Hyung Tae Lee, San Ling, Khoa Nguyen y Huaxiong Wang. "Provably Secure Group Signature Schemes From Code-Based Assumptions". IEEE Transactions on Information Theory 66, n.º 9 (septiembre de 2020): 5754–73. http://dx.doi.org/10.1109/tit.2020.2976073.
Texto completoSeong, Jin-Taek. "Group Testing-Based Robust Algorithm for Diagnosis of COVID-19". Diagnostics 10, n.º 6 (11 de junio de 2020): 396. http://dx.doi.org/10.3390/diagnostics10060396.
Texto completoWang, Hong, Jianhua Li, Feng Zhu y Zhe Wang. "Asynchronous Group Authentication Based on Geometric Approach". Security and Communication Networks 2018 (5 de diciembre de 2018): 1–9. http://dx.doi.org/10.1155/2018/5289383.
Texto completoLin, Chia-Chen, Chin-Chen Chang y Yao-Zhu Zheng. "A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation". Symmetry 12, n.º 12 (5 de diciembre de 2020): 2009. http://dx.doi.org/10.3390/sym12122009.
Texto completoBegum, S. Jabeen y T. Purusothaman. "Hierarchical Tree Structure Based Clustering Schemes for Secure Group Communication". Mobile Networks and Applications 21, n.º 3 (12 de septiembre de 2015): 550–60. http://dx.doi.org/10.1007/s11036-015-0649-5.
Texto completoTahat, Nedal y Ashraf A. Tahat. "Identity-based threshold group signature scheme based on multiple hard number theoretic problems". International Journal of Electrical and Computer Engineering (IJECE) 10, n.º 4 (1 de agosto de 2020): 3695. http://dx.doi.org/10.11591/ijece.v10i4.pp3695-3701.
Texto completoLi, Yan, Hui Min Li y Yi Li. "Schemes Selection of Yarn Tension Detection and Control Based on Fuzzy Multiple Attribute Group Decision Making". Advanced Materials Research 694-697 (mayo de 2013): 2829–34. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2829.
Texto completoChen, Qingnan, Ting Wu, Chengnan Hu, Anbang Chen y Qiuhua Zheng. "An Identity-Based Cross-Domain Authenticated Asymmetric Group Key Agreement". Information 12, n.º 3 (5 de marzo de 2021): 112. http://dx.doi.org/10.3390/info12030112.
Texto completoMa, Chunguang, Lei Zhang, Songtao Yang y Xiaodong Zheng. "Hiding Yourself Behind Collaborative Users When Using Continuous Location-Based Services". Journal of Circuits, Systems and Computers 26, n.º 07 (17 de marzo de 2017): 1750119. http://dx.doi.org/10.1142/s0218126617501195.
Texto completoÇalkavur, Selda. "A Study on Multisecret-Sharing Schemes Based on Linear Codes". Emerging Science Journal 4, n.º 4 (1 de agosto de 2020): 263–71. http://dx.doi.org/10.28991/esj-2020-01229.
Texto completoHou, Yuan Hang, Sheng Huang, Yu Long Hu, Xiang Yin Meng, Wen Quan Wang y Chao Wang. "Group Decision Making of Naval Ship Principal Dimensions Based on PSO Algorithm". Advanced Materials Research 201-203 (febrero de 2011): 1233–37. http://dx.doi.org/10.4028/www.scientific.net/amr.201-203.1233.
Texto completoZhu, Jianhua, Guohua Cui y Shiyang Zhou. "Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings". International Journal of Information Technology and Computer Science 1, n.º 1 (18 de octubre de 2009): 16–22. http://dx.doi.org/10.5815/ijitcs.2009.01.03.
Texto completoHarn, Lein, Chingfang Hsu y Zhe Xia. "Lightweight group key distribution schemes based on pre-shared pairwise keys". IET Communications 14, n.º 13 (11 de agosto de 2020): 2162–65. http://dx.doi.org/10.1049/iet-com.2019.1345.
Texto completoDuran Diaz, R., L. Hernandez Encinas y J. Munoz Masque. "Two proposals for group signature schemes based on number theory problems". Logic Journal of IGPL 21, n.º 4 (17 de agosto de 2012): 648–58. http://dx.doi.org/10.1093/jigpal/jzs035.
Texto completoZhang, Su-Ying y Zi-Chen Deng. "Group preserving schemes for nonlinear dynamic system based on RKMK methods". Applied Mathematics and Computation 175, n.º 1 (abril de 2006): 497–507. http://dx.doi.org/10.1016/j.amc.2005.07.062.
Texto completoŞahin, Meryem Soysaldı y Sedat Akleylek. "A survey of quantum secure group signature schemes: Lattice-based approach". Journal of Information Security and Applications 73 (marzo de 2023): 103432. http://dx.doi.org/10.1016/j.jisa.2023.103432.
Texto completoWang, Gang, Jiayin Feng, Guolin Li, Jinling Song y Dongyan Jia. "Energy Consumption and QoS Optimization Coverage Mechanism in Wireless Sensor Networks Based on Swarm Sensing Algorithm". Journal of Sensors 2022 (28 de septiembre de 2022): 1–11. http://dx.doi.org/10.1155/2022/4908978.
Texto completoLi, Shangle, Ruili Yang y Jiageng Chen. "A Privacy-Preserving Authentication Scheme for VANETs with Exculpability". Security and Communication Networks 2023 (7 de febrero de 2023): 1–12. http://dx.doi.org/10.1155/2023/8676929.
Texto completoLiu, Hui, Peng Wang, Teyang Zhao, Zhenggang Fan y Houlin Pan. "A Group-Based Droop Control Strategy Considering Pitch Angle Protection to Deloaded Wind Farms". Energies 15, n.º 8 (8 de abril de 2022): 2722. http://dx.doi.org/10.3390/en15082722.
Texto completoGohar, Moneeb, Jin-Ghoo Choi y Seok-Joo Koh. "An ID/Locator Separation Based Group Mobility Management in Wireless Body Area Network". Journal of Sensors 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/537205.
Texto completoGuo, Yusheng, Xingxing Jia, Qimeng Chu y Daoshun Wang. "A Novel XOR-Based Threshold Visual Cryptography with Adjustable Pixel Expansion". Applied Sciences 10, n.º 4 (15 de febrero de 2020): 1321. http://dx.doi.org/10.3390/app10041321.
Texto completoZhou, Guomin, Peng Zeng, Xiaohui Yuan, Siyuan Chen y Kim-Kwang Raymond Choo. "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model". Security and Communication Networks 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/1915239.
Texto completoMohamad, Mohd Saiful Adli. "Threshold-directed signature scheme based on hybrid number theoretic problems". Asian-European Journal of Mathematics 13, n.º 05 (4 de abril de 2019): 2050098. http://dx.doi.org/10.1142/s1793557120500989.
Texto completoEpprecht, Eugenio Kahn, Laura França Marques Barbosa y Bruno Francisco Teixeira Simões. "SPC of multiple stream processes: a chart for enhanced detection of shifts in one stream". Production 21, n.º 2 (29 de abril de 2011): 242–53. http://dx.doi.org/10.1590/s0103-65132011005000022.
Texto completoShen, Shiqi, Hui Wang, Mengqiu Li, Yaojing Feng y Yichang Zhong. "Torque-Enhanced Phase Current Detection Schemes for Multiphase Switched Reluctance Motors with Reduced Sensors". Applied Sciences 12, n.º 12 (11 de junio de 2022): 5956. http://dx.doi.org/10.3390/app12125956.
Texto completoAl-shareeda, Mahmood A., Mohammed Anbar, Selvakumar Manickam y Iznan H. Hasbullah. "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network". Symmetry 12, n.º 10 (14 de octubre de 2020): 1687. http://dx.doi.org/10.3390/sym12101687.
Texto completoFerre, Guillaume y Jean-pierre Cances. "New Layered Space-Time Schemes Based on Group of Three Transmit Antenna". IEEE Communications Letters 12, n.º 1 (enero de 2008): 38–40. http://dx.doi.org/10.1109/lcomm.2008.071611.
Texto completoMiao, Ying y Sanpei Kageyama. "Two classes of q-ary codes based on group divisible association schemes". Discrete Mathematics 195, n.º 1-3 (enero de 1999): 269–76. http://dx.doi.org/10.1016/s0012-365x(98)00186-1.
Texto completoWang, Jun Ying, De Hua Li y Shi Hong Wu. "Study on Divergence Based on the Grey Relational Degree in the Group Decision-Making". Applied Mechanics and Materials 29-32 (agosto de 2010): 1168–74. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.1168.
Texto completoZhang, Yu, Lei You y Yin Li. "Tree-Based Public Key Encryption with Conjunctive Keyword Search". Security and Communication Networks 2021 (5 de noviembre de 2021): 1–16. http://dx.doi.org/10.1155/2021/7034944.
Texto completoChande, Manoj Kumar y Balwant Singh Thakur. "Proxy-Protected Proxy Multi-Signature Based on Elliptic Curve". International Journal of Informatics and Communication Technology (IJ-ICT) 3, n.º 1 (1 de abril de 2014): 67. http://dx.doi.org/10.11591/ijict.v3i1.pp67-72.
Texto completoSun, Mei, Yuyan Guo, Dongbing Zhang y MingMing Jiang. "Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks". Complexity 2021 (4 de mayo de 2021): 1–13. http://dx.doi.org/10.1155/2021/5526412.
Texto completoLi, Xiaoping, Hefeng Chen, Yanjun Liu y Chin-Chen Chang. "Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem". Security and Communication Networks 2020 (14 de julio de 2020): 1–8. http://dx.doi.org/10.1155/2020/6073721.
Texto completoLee, Jiwon, Seunghwa Lee, Jihye Kim y Hyunok Oh. "Scalable Wildcarded Identity-Based Encryption with Full Security". Electronics 9, n.º 9 (6 de septiembre de 2020): 1453. http://dx.doi.org/10.3390/electronics9091453.
Texto completoMeena, Ritu y Sonajharia Minz. "Group Recommender Systems – An Evolutionary Approach Based on Multi-expert System for Consensus". Journal of Intelligent Systems 29, n.º 1 (20 de noviembre de 2018): 1092–108. http://dx.doi.org/10.1515/jisys-2018-0081.
Texto completoDEMİRCİ, Niymet, Ülkü ÇOBAN SURAL y Neşe IŞIK TERTEMİZ. "A Study on the Proofs Used by Primary Education Teacher Candidates in Circumference Problem Solutions and Instructional Explanations". International Journal of Psychology and Educational Studies 9 (23 de octubre de 2022): 1027–46. http://dx.doi.org/10.52380/ijpes.2022.9.4.782.
Texto completo