To search, Click below search items.

 

All Published Papers Search Service

Results for ; Total 10576

Title

A Visual Information Encryption Scheme Based on Visual Cryptography and D-H Key Agreement Scheme

Author

Chao-Wen Chan, Yi-Da Wu

Citation

Vol. 8  No. 4  pp. 128-132

Keywords

Visual cryptography, secret sharing, toral automorphism, key agreement


Title

A new Technique using Signal Correlation of One Node B to Estimate Mobile Location

Author

Keeratpal Singh, Mahamod Ismail, Kasmiran Jumari

Citation

Vol. 8  No. 4  pp. 133-139

Keywords

Location Determining Techniques, Positioning in UMTS, Location Based Services, Neural Network


Title

Data and Event Stream Mining

Author

Kavya Naveen, M.V.Sathyanarayana, N.C. Naveen

Citation

Vol. 8  No. 4  pp. 140-143

Keywords

Mining, event streams, constraint ?based mining, data streams, knowledge


Title

A Threshold Determining Method for the Dynamic Filtering in Wireless Sensor Networks Based on Fuzzy Logic

Author

Sang Jin Lee, Hae Young Lee, Tae Ho Cho

Citation

Vol. 8  No. 4  pp. 155-159

Keywords

sensor networks, false reports, en-route filtering, false data injection attack, fuzzy logic, security


[1] ... [prev] [331] [332] [333] [334] [335] [336] [337] [338] [339] [340] [next] ... [2644]