Статті в журналах з теми "Group-based schemes"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Group-based schemes".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Bernardini, Riccardo, Roberto Cesco Fabbro, and Roberto Rinaldo. "Group-Based Reduction Schemes for Streaming Applications." ISRN Communications and Networking 2011 (September 8, 2011): 1–10. http://dx.doi.org/10.5402/2011/898254.
Повний текст джерелаGohar, Moneeb, Hind Ahmed M. Alrubaish, Ruba Suliman M. Alowaid, and Jin-Ghoo Choi. "Distributed Group-Based Mobility Management Scheme in Wireless Body Area Networks." Wireless Communications and Mobile Computing 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/4180801.
Повний текст джерелаPerera, Maharage Nisansala Sevwandi, and Takeshi Koshiba. "Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation." Cryptography 4, no. 4 (November 30, 2020): 33. http://dx.doi.org/10.3390/cryptography4040033.
Повний текст джерелаAprahamian, Hrayer, Ebru K. Bish, and Douglas R. Bish. "Static Risk-Based Group Testing Schemes Under Imperfectly Observable Risk." Stochastic Systems 10, no. 4 (December 2020): 361–90. http://dx.doi.org/10.1287/stsy.2019.0059.
Повний текст джерелаMeshram, Chandrashekhar, Agbotiname Lucky Imoize, Amer Aljaedi, Adel R. Alharbi, Sajjad Shaukat Jamal, and Sharad Kumar Barve. "An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps." Sensors 21, no. 21 (October 23, 2021): 7039. http://dx.doi.org/10.3390/s21217039.
Повний текст джерелаChen, F. L., and Z. F. Han. "Quantum group signature scheme based on controlled quantum teleportation." International Journal of Quantum Information 14, no. 08 (December 2016): 1650041. http://dx.doi.org/10.1142/s0219749916500416.
Повний текст джерелаAprahamian, Hrayer, Douglas R. Bish, and Ebru K. Bish. "Optimal Risk-Based Group Testing." Management Science 65, no. 9 (September 2019): 4365–84. http://dx.doi.org/10.1287/mnsc.2018.3138.
Повний текст джерелаMa, Li Zhen. "Improved VLR Group Signature Based on DTDH Assumption." Advanced Engineering Forum 6-7 (September 2012): 520–24. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.520.
Повний текст джерелаKang, Hyung-Woo, and Seok-Joo Koh. "Enhanced group communication in constrained application protocol–based Internet-of-things networks." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771877279. http://dx.doi.org/10.1177/1550147718772793.
Повний текст джерелаCao, Liling, Mei Liang, Zheng Zhang, and Shouqi Cao. "Certificateless Cross-Domain Group Authentication Key Agreement Scheme Based on ECC." Wireless Communications and Mobile Computing 2022 (December 5, 2022): 1–16. http://dx.doi.org/10.1155/2022/7519688.
Повний текст джерелаLiu, Dawei, Zhigen Hu, and Wencheng Guo. "Multi-Attribute Group-Decision on a Construction Diversion Scheme for Hydropower Projects Based on Perception Utility." Energies 11, no. 11 (November 4, 2018): 3027. http://dx.doi.org/10.3390/en11113027.
Повний текст джерелаGuo, Jingjing, and Jiacong Sun. "Secure and Practical Group Nearest Neighbor Query for Location-Based Services in Cloud Computing." Security and Communication Networks 2021 (September 25, 2021): 1–17. http://dx.doi.org/10.1155/2021/5686506.
Повний текст джерелаB. R., Purushothama, and B. B. Amberker. "Secure group and multi-layer group communication schemes based on polynomial interpolation." Security and Communication Networks 6, no. 6 (August 29, 2012): 735–56. http://dx.doi.org/10.1002/sec.607.
Повний текст джерелаWang, Luping, Kai Zhang, Haifeng Qian, and Jie Chen. "Group Signature with Verifier-Local Revocation Based on Coding Theory." Security and Communication Networks 2021 (August 20, 2021): 1–12. http://dx.doi.org/10.1155/2021/3259767.
Повний текст джерелаEzerman, Martianus Frederic, Hyung Tae Lee, San Ling, Khoa Nguyen, and Huaxiong Wang. "Provably Secure Group Signature Schemes From Code-Based Assumptions." IEEE Transactions on Information Theory 66, no. 9 (September 2020): 5754–73. http://dx.doi.org/10.1109/tit.2020.2976073.
Повний текст джерелаSeong, Jin-Taek. "Group Testing-Based Robust Algorithm for Diagnosis of COVID-19." Diagnostics 10, no. 6 (June 11, 2020): 396. http://dx.doi.org/10.3390/diagnostics10060396.
Повний текст джерелаWang, Hong, Jianhua Li, Feng Zhu, and Zhe Wang. "Asynchronous Group Authentication Based on Geometric Approach." Security and Communication Networks 2018 (December 5, 2018): 1–9. http://dx.doi.org/10.1155/2018/5289383.
Повний текст джерелаLin, Chia-Chen, Chin-Chen Chang, and Yao-Zhu Zheng. "A Ring Signature Based Anonymity Authentication Scheme for Group Medical Consultation." Symmetry 12, no. 12 (December 5, 2020): 2009. http://dx.doi.org/10.3390/sym12122009.
Повний текст джерелаBegum, S. Jabeen, and T. Purusothaman. "Hierarchical Tree Structure Based Clustering Schemes for Secure Group Communication." Mobile Networks and Applications 21, no. 3 (September 12, 2015): 550–60. http://dx.doi.org/10.1007/s11036-015-0649-5.
Повний текст джерелаTahat, Nedal, and Ashraf A. Tahat. "Identity-based threshold group signature scheme based on multiple hard number theoretic problems." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (August 1, 2020): 3695. http://dx.doi.org/10.11591/ijece.v10i4.pp3695-3701.
Повний текст джерелаLi, Yan, Hui Min Li, and Yi Li. "Schemes Selection of Yarn Tension Detection and Control Based on Fuzzy Multiple Attribute Group Decision Making." Advanced Materials Research 694-697 (May 2013): 2829–34. http://dx.doi.org/10.4028/www.scientific.net/amr.694-697.2829.
Повний текст джерелаChen, Qingnan, Ting Wu, Chengnan Hu, Anbang Chen, and Qiuhua Zheng. "An Identity-Based Cross-Domain Authenticated Asymmetric Group Key Agreement." Information 12, no. 3 (March 5, 2021): 112. http://dx.doi.org/10.3390/info12030112.
Повний текст джерелаMa, Chunguang, Lei Zhang, Songtao Yang, and Xiaodong Zheng. "Hiding Yourself Behind Collaborative Users When Using Continuous Location-Based Services." Journal of Circuits, Systems and Computers 26, no. 07 (March 17, 2017): 1750119. http://dx.doi.org/10.1142/s0218126617501195.
Повний текст джерелаÇalkavur, Selda. "A Study on Multisecret-Sharing Schemes Based on Linear Codes." Emerging Science Journal 4, no. 4 (August 1, 2020): 263–71. http://dx.doi.org/10.28991/esj-2020-01229.
Повний текст джерелаHou, Yuan Hang, Sheng Huang, Yu Long Hu, Xiang Yin Meng, Wen Quan Wang, and Chao Wang. "Group Decision Making of Naval Ship Principal Dimensions Based on PSO Algorithm." Advanced Materials Research 201-203 (February 2011): 1233–37. http://dx.doi.org/10.4028/www.scientific.net/amr.201-203.1233.
Повний текст джерелаZhu, Jianhua, Guohua Cui, and Shiyang Zhou. "Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings." International Journal of Information Technology and Computer Science 1, no. 1 (October 18, 2009): 16–22. http://dx.doi.org/10.5815/ijitcs.2009.01.03.
Повний текст джерелаHarn, Lein, Chingfang Hsu, and Zhe Xia. "Lightweight group key distribution schemes based on pre-shared pairwise keys." IET Communications 14, no. 13 (August 11, 2020): 2162–65. http://dx.doi.org/10.1049/iet-com.2019.1345.
Повний текст джерелаDuran Diaz, R., L. Hernandez Encinas, and J. Munoz Masque. "Two proposals for group signature schemes based on number theory problems." Logic Journal of IGPL 21, no. 4 (August 17, 2012): 648–58. http://dx.doi.org/10.1093/jigpal/jzs035.
Повний текст джерелаZhang, Su-Ying, and Zi-Chen Deng. "Group preserving schemes for nonlinear dynamic system based on RKMK methods." Applied Mathematics and Computation 175, no. 1 (April 2006): 497–507. http://dx.doi.org/10.1016/j.amc.2005.07.062.
Повний текст джерелаŞahin, Meryem Soysaldı, and Sedat Akleylek. "A survey of quantum secure group signature schemes: Lattice-based approach." Journal of Information Security and Applications 73 (March 2023): 103432. http://dx.doi.org/10.1016/j.jisa.2023.103432.
Повний текст джерелаWang, Gang, Jiayin Feng, Guolin Li, Jinling Song, and Dongyan Jia. "Energy Consumption and QoS Optimization Coverage Mechanism in Wireless Sensor Networks Based on Swarm Sensing Algorithm." Journal of Sensors 2022 (September 28, 2022): 1–11. http://dx.doi.org/10.1155/2022/4908978.
Повний текст джерелаLi, Shangle, Ruili Yang, and Jiageng Chen. "A Privacy-Preserving Authentication Scheme for VANETs with Exculpability." Security and Communication Networks 2023 (February 7, 2023): 1–12. http://dx.doi.org/10.1155/2023/8676929.
Повний текст джерелаLiu, Hui, Peng Wang, Teyang Zhao, Zhenggang Fan, and Houlin Pan. "A Group-Based Droop Control Strategy Considering Pitch Angle Protection to Deloaded Wind Farms." Energies 15, no. 8 (April 8, 2022): 2722. http://dx.doi.org/10.3390/en15082722.
Повний текст джерелаGohar, Moneeb, Jin-Ghoo Choi, and Seok-Joo Koh. "An ID/Locator Separation Based Group Mobility Management in Wireless Body Area Network." Journal of Sensors 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/537205.
Повний текст джерелаGuo, Yusheng, Xingxing Jia, Qimeng Chu, and Daoshun Wang. "A Novel XOR-Based Threshold Visual Cryptography with Adjustable Pixel Expansion." Applied Sciences 10, no. 4 (February 15, 2020): 1321. http://dx.doi.org/10.3390/app10041321.
Повний текст джерелаZhou, Guomin, Peng Zeng, Xiaohui Yuan, Siyuan Chen, and Kim-Kwang Raymond Choo. "An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model." Security and Communication Networks 2017 (2017): 1–7. http://dx.doi.org/10.1155/2017/1915239.
Повний текст джерелаMohamad, Mohd Saiful Adli. "Threshold-directed signature scheme based on hybrid number theoretic problems." Asian-European Journal of Mathematics 13, no. 05 (April 4, 2019): 2050098. http://dx.doi.org/10.1142/s1793557120500989.
Повний текст джерелаEpprecht, Eugenio Kahn, Laura França Marques Barbosa, and Bruno Francisco Teixeira Simões. "SPC of multiple stream processes: a chart for enhanced detection of shifts in one stream." Production 21, no. 2 (April 29, 2011): 242–53. http://dx.doi.org/10.1590/s0103-65132011005000022.
Повний текст джерелаShen, Shiqi, Hui Wang, Mengqiu Li, Yaojing Feng, and Yichang Zhong. "Torque-Enhanced Phase Current Detection Schemes for Multiphase Switched Reluctance Motors with Reduced Sensors." Applied Sciences 12, no. 12 (June 11, 2022): 5956. http://dx.doi.org/10.3390/app12125956.
Повний текст джерелаAl-shareeda, Mahmood A., Mohammed Anbar, Selvakumar Manickam, and Iznan H. Hasbullah. "An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network." Symmetry 12, no. 10 (October 14, 2020): 1687. http://dx.doi.org/10.3390/sym12101687.
Повний текст джерелаFerre, Guillaume, and Jean-pierre Cances. "New Layered Space-Time Schemes Based on Group of Three Transmit Antenna." IEEE Communications Letters 12, no. 1 (January 2008): 38–40. http://dx.doi.org/10.1109/lcomm.2008.071611.
Повний текст джерелаMiao, Ying, and Sanpei Kageyama. "Two classes of q-ary codes based on group divisible association schemes." Discrete Mathematics 195, no. 1-3 (January 1999): 269–76. http://dx.doi.org/10.1016/s0012-365x(98)00186-1.
Повний текст джерелаWang, Jun Ying, De Hua Li, and Shi Hong Wu. "Study on Divergence Based on the Grey Relational Degree in the Group Decision-Making." Applied Mechanics and Materials 29-32 (August 2010): 1168–74. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.1168.
Повний текст джерелаZhang, Yu, Lei You, and Yin Li. "Tree-Based Public Key Encryption with Conjunctive Keyword Search." Security and Communication Networks 2021 (November 5, 2021): 1–16. http://dx.doi.org/10.1155/2021/7034944.
Повний текст джерелаChande, Manoj Kumar, and Balwant Singh Thakur. "Proxy-Protected Proxy Multi-Signature Based on Elliptic Curve." International Journal of Informatics and Communication Technology (IJ-ICT) 3, no. 1 (April 1, 2014): 67. http://dx.doi.org/10.11591/ijict.v3i1.pp67-72.
Повний текст джерелаSun, Mei, Yuyan Guo, Dongbing Zhang, and MingMing Jiang. "Anonymous Authentication and Key Agreement Scheme Combining the Group Key for Vehicular Ad Hoc Networks." Complexity 2021 (May 4, 2021): 1–13. http://dx.doi.org/10.1155/2021/5526412.
Повний текст джерелаLi, Xiaoping, Hefeng Chen, Yanjun Liu, and Chin-Chen Chang. "Unordered Multisecret Sharing Based on Generalized Chinese Remainder Theorem." Security and Communication Networks 2020 (July 14, 2020): 1–8. http://dx.doi.org/10.1155/2020/6073721.
Повний текст джерелаLee, Jiwon, Seunghwa Lee, Jihye Kim, and Hyunok Oh. "Scalable Wildcarded Identity-Based Encryption with Full Security." Electronics 9, no. 9 (September 6, 2020): 1453. http://dx.doi.org/10.3390/electronics9091453.
Повний текст джерелаMeena, Ritu, and Sonajharia Minz. "Group Recommender Systems – An Evolutionary Approach Based on Multi-expert System for Consensus." Journal of Intelligent Systems 29, no. 1 (November 20, 2018): 1092–108. http://dx.doi.org/10.1515/jisys-2018-0081.
Повний текст джерелаDEMİRCİ, Niymet, Ülkü ÇOBAN SURAL, and Neşe IŞIK TERTEMİZ. "A Study on the Proofs Used by Primary Education Teacher Candidates in Circumference Problem Solutions and Instructional Explanations." International Journal of Psychology and Educational Studies 9 (October 23, 2022): 1027–46. http://dx.doi.org/10.52380/ijpes.2022.9.4.782.
Повний текст джерела