From post

Modified access polynomial based self-healing key management schemes with broadcast authentication and enhanced collusion resistance in wireless sensor networks.

, , , , и . Ad Hoc Networks, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Neural-PDE: a RNN based neural network for solving time dependent PDEs., , , , и . Commun. Inf. Syst., 22 (2): 223-245 (2022)Dynamic Phase Boundaries for Compressible Fluids., , , , и . SIAM J. Sci. Comput., 30 (2): 895-915 (2008)Hierarchical reconstruction for discontinuous Galerkin methods on unstructured grids with a WENO-type linear reconstruction and partial neighboring cells., , и . J. Comput. Phys., 228 (6): 2194-2212 (2009)Well-Balanced Discontinuous Galerkin Method for Shallow Water Equations with Constant Subtraction Techniques on Unstructured Meshes., , , и . J. Sci. Comput., 81 (3): 2115-2131 (2019)Efficient implementation of ADER schemes for Euler and magnetohydrodynamical flows on structured meshes - Speed comparisons with Runge-Kutta methods., , , , и . J. Comput. Phys., (2013)MobileFaceSwap: A Lightweight Framework for Video Face Swapping., , , , , , и . AAAI, стр. 2973-2981. AAAI Press, (2022)A fictitious domain method with a hybrid cell model for simulating motion of cells in fluid flow., , , и . J. Comput. Phys., (2015)ReEnFP: Detail-Preserving Face Reconstruction by Encoding Facial Priors., , , , , и . WACV, стр. 6107-6117. IEEE, (2023)An Efficient Adaptive De-blocking Algorithm., , и . CIS (2), том 3802 из Lecture Notes in Computer Science, стр. 953-958. Springer, (2005)The design and applications for straightening exceeded value of elevator guide rail based on neural network., , , и . ICCAIS, стр. 12-15. IEEE, (2015)