×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [efficient scheme]
Home >
efficient scheme
A more efficient and secure dynamic ID- based remote user authentication scheme Yan-yan Wang, Jia-yong Liu, Feng-xia Xiao, Jing Dan in Computer Communications.
224 views
A Survey on Secure Protocols for Wireless Sensor Networks Course : 60-564 Instructor : Dr. A. K. Aggarwal Presented by Shamsul Wazed & Quazi Rahman School.
216 views
Logic and Computer Design Dr. Sanjay P. Ahuja, Ph.D. FIS Distinguished Professor of CIS (2010-2014) School of Computing, UNF.
227 views
Sussman anomaly - analysis
54 views
Survey Propagation. Outline Survey Propagation: an algorithm for satisfiability 1 – Warning Propagation – Belief Propagation – Survey Propagation Survey.
232 views
Adaptive Edge-Based Side-Match Finite-State Classified Vector Quantization with Quadtree Map
73 views
A Gentle Introduction to Bilateral Filtering and its Applications
25 views
HAARP-Induced Substorm ? image by A. Lee Snyder A.V. Streltsov Thayer School of Engineering, Dartmouth College also: J. Kan, University of Alaska A.L.
218 views
Power spectral density (PSD)… of ASK,PSK and FSK
380 views
An Efficient Scheme for Authenticating Public Keys in Sensor Networks
24 views
Identity
49 views
KeyStone Inter-Processor Communications (IPC). Agenda Basic Concepts IPC Library MsgCom Library Demos and Examples.
254 views
< Previous
Next >