Application and research of automatic password update technology based on the development of wireless network
暂无分享,去创建一个
[1] F. Richard Yu,et al. Wireless Network Virtualization: A Survey, Some Research Issues and Challenges , 2015, IEEE Communications Surveys & Tutorials.
[2] Moe Z. Win,et al. Wireless Network Intrinsic Secrecy , 2015, IEEE/ACM Transactions on Networking.
[3] J. Cramm,et al. Neighborhood attributes security and solidarity promote the well‐being of community‐dwelling older people in the Netherlands , 2014, Geriatrics & gerontology international.
[4] Xiaohui Yuan,et al. An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.
[5] F. Asche,et al. Value of Brands and Other Attributes: Hedonic Analysis of Retail Frozen Fish in the UK , 2007, Marine Resource Economics.
[6] Kerstin Thurow,et al. A Context-Aware mHealth System for Online Physiological Monitoring in Remote Healthcare , 2015, Int. J. Comput. Commun. Control.
[7] Mohamed Elhoseny,et al. An Efficient Optimal Key Based Chaos Function for Medical Image Security , 2018, IEEE Access.
[8] Mohamed Elhoseny,et al. A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption , 2016, J. King Saud Univ. Comput. Inf. Sci..
[9] Dingde Jiang,et al. Network coding-based energy-efficient multicast routing algorithm for multi-hop wireless networks , 2015, J. Syst. Softw..
[10] S. Durand,et al. An automatically updated S‐wave model of the upper mantle and the depth extent of azimuthal anisotropy , 2016 .
[11] Marc A. Rosen,et al. Optimization with a simulated annealing algorithm of a hybrid system for renewable energy including battery and hydrogen storage , 2018, Energy.
[12] Senyo Tse. Attributes of industry, industry segment and firm-specific information in security valuation* , 1989 .
[13] Mohamed Elhoseny,et al. Hybrid optimization with cryptography encryption for medical image security in Internet of Things , 2018, Neural Computing and Applications.
[14] Mohamed Elhoseny,et al. Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique , 2018, Journal of Ambient Intelligence and Humanized Computing.
[15] Zaher Dawy,et al. Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.
[16] R. Henrik Nilsson,et al. A Comprehensive, Automatically Updated Fungal ITS Sequence Dataset for Reference-Based Chimera Control in Environmental Sequencing Efforts , 2015, Microbes and environments.
[17] J. Giesen,et al. Assessing the Reactions of Males and Females to Attributes of the Principalship , 2003 .
[18] Filip Biljecki,et al. Automatic Update of Road Attributes by Mining GPS Tracks , 2016, Trans. GIS.
[19] Naveen Amblee. The impact of cleanliness on customer perceptions of security in hostels: A WOM-based approach , 2015 .
[20] Mohamed Elhoseny,et al. Balancing Energy Consumption in Heterogeneous Wireless Sensor Networks Using Genetic Algorithm , 2015, IEEE Communications Letters.
[21] Vania Ceccato,et al. Security in Stockholm's underground stations: The importance of environmental attributes and context , 2013 .
[22] Sheng Zhong,et al. Wormhole Attack Detection Algorithms in Wireless Network Coding Systems , 2015, IEEE Transactions on Mobile Computing.
[23] SK Hafizul Islam,et al. Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps , 2015, Inf. Sci..