Results 31 to 40 of about 276,474 (279)

A Collaborative Key Management Protocol in Ciphertext Policy Attribute-Based Encryption for Cloud Data Sharing

open access: yesIEEE Access, 2017
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback
Guofeng Lin, Hanshu Hong, Zhixin Sun
doaj   +1 more source

Low-energy finite field arithmetic primitives for implementing security in wireless sensor networks [PDF]

open access: yes, 2006
In this paper we propose the use of identity based encryption (IBE) for ensuring a secure wireless sensor network. In this context we have implemented the arithmetic operations required for the most computationally expensive part of IBE, which is the ...
Diamond, Dermot   +2 more
core   +1 more source

Redundancy Model and Boundary Effects Based Coverage-Enhancing Algorithm for 3D Underwater Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2014
In the study of three-dimensional underwater sensor networks, the nodes would produce changes in perception range under the influence of environmental factors and their own hardware. Requesting all nodes completely isomorphic is unrealistic.
Junjie Huang   +5 more
doaj   +1 more source

Wireless sensor networks [PDF]

open access: yesIEEE Wireless Communications, 2004
Havinga, Paul J.M.   +2 more
  +5 more sources

Improved Virtual Potential Field Algorithm Based on Probability Model in Three-Dimensional Directional Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2012
In conventional directional sensor networks, coverage control for each sensor is based on a 2D directional sensing model. However, 2D directional sensing model failed to accurately characterize the actual application scene of image/video sensor networks.
Junjie Huang   +3 more
doaj   +1 more source

A Detection Method for Anomaly Flow in Software Defined Network

open access: yesIEEE Access, 2018
As a new type of network structure, the Software Defined Network (SDN) provides a new solution for network flow management and optimization, which has made the accurate detection of anomaly SDN flows a hot research topic. This paper presents an SDN-based
Huijun Peng   +4 more
doaj   +1 more source

Improving energy efficiency in wireless sensor networks through scheduling and routing

open access: yes, 2012
This paper is about the wireless sensor network in environmental monitoring applications. A Wireless Sensor Network consists of many sensor nodes and a base station.
A, Sivasubramanian., R, Rathna.
core   +1 more source

Online Spectrum Prediction With Adaptive Threshold Quantization

open access: yesIEEE Access, 2019
In this paper, we explore the spectrum inference to achieve the spectrum occupancy in advance through analyzing the historical spectrum. We have conceived an offline-online cooperative framework.
Haoyu Li   +4 more
doaj   +1 more source

Real-time image streaming over a low-bandwidth wireless camera network [PDF]

open access: yes, 2007
In this paper we describe the recent development of a low-bandwidth wireless camera sensor network. We propose a simple, yet effective, network architecture which allows multiple cameras to be connected to the network and synchronize their communication ...
Corke, P.   +4 more
core   +2 more sources

Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy