Application and research of automatic password update technology based on the development of wireless network

[1]  F. Richard Yu,et al.  Wireless Network Virtualization: A Survey, Some Research Issues and Challenges , 2015, IEEE Communications Surveys & Tutorials.

[2]  Moe Z. Win,et al.  Wireless Network Intrinsic Secrecy , 2015, IEEE/ACM Transactions on Networking.

[3]  J. Cramm,et al.  Neighborhood attributes security and solidarity promote the well‐being of community‐dwelling older people in the Netherlands , 2014, Geriatrics & gerontology international.

[4]  Xiaohui Yuan,et al.  An energy efficient encryption method for secure dynamic WSN , 2016, Secur. Commun. Networks.

[5]  F. Asche,et al.  Value of Brands and Other Attributes: Hedonic Analysis of Retail Frozen Fish in the UK , 2007, Marine Resource Economics.

[6]  Kerstin Thurow,et al.  A Context-Aware mHealth System for Online Physiological Monitoring in Remote Healthcare , 2015, Int. J. Comput. Commun. Control.

[7]  Mohamed Elhoseny,et al.  An Efficient Optimal Key Based Chaos Function for Medical Image Security , 2018, IEEE Access.

[8]  Mohamed Elhoseny,et al.  A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption , 2016, J. King Saud Univ. Comput. Inf. Sci..

[9]  Dingde Jiang,et al.  Network coding-based energy-efficient multicast routing algorithm for multi-hop wireless networks , 2015, J. Syst. Softw..

[10]  S. Durand,et al.  An automatically updated S‐wave model of the upper mantle and the depth extent of azimuthal anisotropy , 2016 .

[11]  Marc A. Rosen,et al.  Optimization with a simulated annealing algorithm of a hybrid system for renewable energy including battery and hydrogen storage , 2018, Energy.

[12]  Senyo Tse Attributes of industry, industry segment and firm-specific information in security valuation* , 1989 .

[13]  Mohamed Elhoseny,et al.  Hybrid optimization with cryptography encryption for medical image security in Internet of Things , 2018, Neural Computing and Applications.

[14]  Mohamed Elhoseny,et al.  Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique , 2018, Journal of Ambient Intelligence and Humanized Computing.

[15]  Zaher Dawy,et al.  Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.

[16]  R. Henrik Nilsson,et al.  A Comprehensive, Automatically Updated Fungal ITS Sequence Dataset for Reference-Based Chimera Control in Environmental Sequencing Efforts , 2015, Microbes and environments.

[17]  J. Giesen,et al.  Assessing the Reactions of Males and Females to Attributes of the Principalship , 2003 .

[18]  Filip Biljecki,et al.  Automatic Update of Road Attributes by Mining GPS Tracks , 2016, Trans. GIS.

[19]  Naveen Amblee The impact of cleanliness on customer perceptions of security in hostels: A WOM-based approach , 2015 .

[20]  Mohamed Elhoseny,et al.  Balancing Energy Consumption in Heterogeneous Wireless Sensor Networks Using Genetic Algorithm , 2015, IEEE Communications Letters.

[21]  Vania Ceccato,et al.  Security in Stockholm's underground stations: The importance of environmental attributes and context , 2013 .

[22]  Sheng Zhong,et al.  Wormhole Attack Detection Algorithms in Wireless Network Coding Systems , 2015, IEEE Transactions on Mobile Computing.

[23]  SK Hafizul Islam,et al.  Design and analysis of a three party password-based authenticated key exchange protocol using extended chaotic maps , 2015, Inf. Sci..