- On the rotation Boolean permutation
- A publicly verifiable network coding scheme with null-space HMAC
- Edge computing-based security authentication algorithm for multiple RFID tags
- An improved trusted method for global congestion price computing based on software defined networking in data-centred network
- Modelling behaviour of cyber-physical system and verifying its safety based on algebra of event
- Image super-resolution via Gaussian scale patch group sparse representation
- Multi-hypothesis compressed video sensing by two-step iterative thresholding
30 May 2018
Special issue published: "Data Security, Privacy and Trust"
International Journal of Intelligent Information and Database Systems 11(2/3) 2018
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment