|
Issue |
Title |
|
Vol 20, No 7 (2019) |
An e-cash Scheme with Multiple Denominations and Transferability |
Abstract
PDF
|
Jia-Ning Luo, Ming-Hour Yang |
|
Vol 21, No 1 (2020) |
An ECC Based Remote User Authentication Protocol |
Abstract
PDF
|
Akasha Shafiq, Izwa Altaf, Khalid Mahmood, Saru Kumari, Chien-Ming Chen |
|
Vol 22, No 7 (2021) |
An Economic Vision of Caching Issues in Content Delivery Networks: Opportunities and Challenges |
Abstract
PDF
|
Yuming Zhang, Bohao Feng, Wei Quan, Hongke Zhang |
|
Vol 22, No 4 (2021) |
An Edge Intelligence-based Generative Data Augmentation System for IoT Image Recognition Tasks |
Abstract
PDF
|
Wei-Jian Hu, Tang-Ying Xie, Bao-Shan Li, Yong-Xing Du, Neal N. Xiong |
|
Vol 10, No 5 (2009) |
An Effective Anomaly Traffic Detection System via Quadruple Attributes for NTU Campus Network |
Abstract
|
Mei-Wen Li, Wei-Yen Day, Phone Lin, Hsin-Hsi Chen |
|
Vol 19, No 5 (2018) |
An Effective Experimental Platform for Multipath Transmission Protocol Algorithms and Performance Analysis |
Abstract
PDF
|
Xuedong Sun, Jianxin Wang, Neal Xiong, Pingping Dong |
|
Vol 17, No 4 (2016) |
An Effective Feature Selection and Data-Stream Classification Model HDP |
Abstract
|
Chunyong Yin, Lu Feng, Luyu Ma, Jeong-Uk Kim, Jin Wang |
|
Vol 25, No 3 (2024) |
An Effective Financial Crisis Early Warning Model Based on an IFOA-BP Neural Network |
Abstract
|
Sha Li, Xuan Chen |
|
Vol 15, No 5 (2014) |
An Effective Video Saliency Detection Model Based on Human Visual Acuity and Spatiotemporal Cues in Cloud Systems |
Abstract
|
Zhi-Jun Fang, Juan Zhang, Wang-Gen Wan, Yu-Ming Fang |
|
Vol 16, No 3 (2015) |
An Efficient Adaptive Fuzzy Learning Diagnosis Method for E-Learning |
Abstract
|
Yu-Sheng Yang, Po-Jen Chuang, Ching-Yi Huang3, Ting-Wei Hou, Chu-Sing Yang |
|
Vol 12, No 4 (2011) |
An Efficient Algorithm for Elliptic Curve Scalar Multiplication Using Extended Double-Base Chain and Point Halving |
Abstract
|
Yong Ding, Yin-Fang Hong, Feng Gui, Zhao-Xia Zheng |
|
Vol 16, No 2 (2015) |
An Efficient Algorithm for Vehicle Guidance Combining Dijkstra and A Algorithm with Fuzzy Inference Theory |
Abstract
|
Jieh-Ren Chang, Yow-Hao Jheng, Chia-Hui Chang, Chi-Hsiang Lo |
|
Vol 22, No 7 (2021) |
An Efficient and Fault-Tolerant Privacy-Preserving D2D Group Communication |
Abstract
PDF
|
Hung-Yu Chien |
|
Vol 16, No 6 (2015) |
An Efficient and Provably-Secure Broadcast Authentication Scheme in Wireless Sensor Networks |
Abstract
|
Rui Guo, Qiao-Yan Wen, Zheng-Ping Jin, Hua Zhang, Jing Zhao |
|
Vol 19, No 4 (2018) |
An Efficient and Reliable Message Dissemination Mechanism for Vehicular Networks on Urban Roads |
Abstract
PDF
|
Linjuan Zhang, Lili Wang, Changqing Xu, Chunzheng Tian, Wanting Zhu |
|
Vol 20, No 2 (2019) |
An Efficient and Secure Authentication Scheme for Vehicle Sensor Networks |
Abstract
PDF
|
Jiani Zhang, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo |
|
Vol 21, No 5 (2020) |
An Efficient and Secure, ID-based Authenticated, Asymmetric Group Key Agreement Protocol for Ubiquitous Pay-TV Networks |
Abstract
PDF
|
Shaheena Khatoon, Sk Md Mizanur Rahman, Raylin Tso, Mohammed F. Alhamid |
|
Vol 20, No 3 (2019) |
An Efficient and Secure RFID Authentication Scheme for C1G2 Standard |
Abstract
PDF
|
Chen-Yang Cheng, Cheng-Ta Huang, Iuon-Chang Lin, Hung-Huei Hsu |
|
Vol 20, No 4 (2019) |
An Efficient and Secure Smart Card Based Authentication Scheme |
Abstract
PDF
|
Chien-Ming Chen, Bin Xiang, King-Hang Wang, Yong Zhang, Tsu-Yang Wu |
|
Vol 20, No 5 (2019) |
An Efficient and Secure Weighted Threshold Signcryption Scheme |
Abstract
PDF
|
Chien-Hua Tsai |
|
Vol 18, No 1 (2017) |
An Efficient and Stable Route Protocol in Wearable Body Networks |
Abstract
|
Chao Li, Zhenjiang Zhang, Fei Xiong, Qing Liu |
|
Vol 20, No 4 (2019) |
An Efficient Approach of GPU-accelerated Stochastic Gradient Descent Method for Matrix Factorization |
Abstract
PDF
|
Feng Li, Yunming Ye, Xutao Li |
|
Vol 15, No 4 (2014) |
An Efficient Architecture for Parallel Skyline Computation over Large Distributed Datasets |
Abstract
|
He Li, Sumin Jang, Jaesoo Yoo |
|
Vol 3, No 2 (2002) |
An Efficient Asynchronous Recovery Algorithm In Wireless Mobile Ad Hoc Networks |
Abstract
|
Tong-Ying Tony Juang, Meng-Chang Liu |
|
Vol 9, No 1 (2008) |
An Efficient Authentication Protocol with Anonymity for 3G/WLAN Interworking |
Abstract
|
Hung-Yu Chien, Hung-Yi Teng, Yen-Cheng Chen |
|
551 - 575 of 2657 Items |
<< < 18 19 20 21 22 23 24 25 26 27 > >> |