Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 3.332
1.
  • Device-to-Device Communication in LTE-Advanced Networks: A Survey
    Jiajia Liu; Kato, Nei; Jianfeng Ma ... IEEE Communications surveys and tutorials, 01/2015, Letnik: 17, Številka: 4
    Journal Article
    Recenzirano

    Among the LTE-A communication techniques, Device-to-Device (D2D) communication which is defined to directly route data traffic between spatially closely located mobile user equipments (UEs), holds ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
2.
  • Verifiable Computation over... Verifiable Computation over Large Database with Incremental Updates
    Chen, Xiaofeng; Li, Jin; Weng, Jian ... IEEE transactions on computers, 2016-Oct.-1, 2016-10-1, 20161001, Letnik: 65, Številka: 10
    Journal Article
    Recenzirano

    The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it could later retrieve a database record and ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
3.
  • Lightweight three-factor au... Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks
    Qi Jiang; Zeadally, Sherali; Jianfeng Ma ... IEEE access, 2017, Letnik: 5
    Journal Article
    Recenzirano
    Odprti dostop

    Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally addressable by any entity connected to the ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
4.
  • New Algorithms for Secure O... New Algorithms for Secure Outsourcing of Modular Exponentiations
    Chen, Xiaofeng; Li, Jin; Ma, Jianfeng ... IEEE transactions on parallel and distributed systems, 09/2014, Letnik: 25, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    With the rapid development of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting more and more attention in the ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
5.
  • Public Integrity Auditing f... Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
    Jiang, Tao; Chen, Xiaofeng; Ma, Jianfeng IEEE transactions on computers, 2016-Aug.-1, 2016-8-1, 20160801, Letnik: 65, Številka: 8
    Journal Article
    Recenzirano

    The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes the secure remote data auditing a hot topic that appeared in the research literature. Recently some ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
6.
  • A Combination Method for An... A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms
    Ma, Zhuo; Ge, Haoran; Liu, Yang ... IEEE access, 2019, Letnik: 7
    Journal Article
    Recenzirano
    Odprti dostop

    Android malware severely threaten system and user security in terms of privilege escalation, remote control, tariff theft, and privacy leakage. Therefore, it is of great importance and necessity to ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
7.
  • Privacy-Preserving Patient-... Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification
    Liu, Ximeng; Lu, Rongxing; Ma, Jianfeng ... IEEE journal of biomedical and health informatics, 2016-March, 2016-Mar, 2016-3-00, 20160301, Letnik: 20, Številka: 2
    Journal Article
    Recenzirano

    Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable attention recently. The advantages of clinical decision ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
8.
  • Blockchain-Based Mutual-Hea... Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network
    Li, Xinghua; Wang, Yunwei; Vijayakumar, Pandi ... IEEE transactions on vehicular technology, 11/2019, Letnik: 68, Številka: 11
    Journal Article
    Recenzirano

    A dynamic group key is required for secure communication in the Unmanned Aerial Vehicles Ad-Hoc Network (UAANET). However, due to the unreliable wireless channel and high-dynamic topology of UAANET, ...
Celotno besedilo
Dostopno za: IJS, NUK, UL
9.
  • Mg doped CuO–Fe2O3 composit... Mg doped CuO–Fe2O3 composites activated by persulfate as highly active heterogeneous catalysts for the degradation of organic pollutants
    Sun, Mengying; Lei, Yu; Cheng, Hao ... Journal of alloys and compounds, 06/2020, Letnik: 825
    Journal Article
    Recenzirano

    Mg doped CuO–Fe2O3 composites were hydrothermally synthesized and characterized by powder X-ray diffraction (XRD), scanning electron microscopy (SEM) and Raman spectroscopy. Mg doping improved the ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPUK, ZAGLJ, ZRSKP
10.
  • A Novel Dynamic Android Mal... A Novel Dynamic Android Malware Detection System With Ensemble Learning
    Feng, Pengbin; Ma, Jianfeng; Sun, Cong ... IEEE access, 2018, Letnik: 6
    Journal Article
    Recenzirano
    Odprti dostop

    With the popularity of Android smartphones, malicious applications targeted Android platform have explosively increased. Proposing effective Android malware detection method for preventing the spread ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK

PDF
1 2 3 4 5
zadetkov: 3.332

Nalaganje filtrov