Results 31 to 40 of about 276,474 (279)
Ciphertext policy attribute-based encryption (CP-ABE) is a promising cryptographic technique for fine-grained access control of outsourced data in the cloud. However, some drawbacks of key management hinder the popularity of its application. One drawback
Guofeng Lin, Hanshu Hong, Zhixin Sun
doaj +1 more source
Low-energy finite field arithmetic primitives for implementing security in wireless sensor networks [PDF]
In this paper we propose the use of identity based encryption (IBE) for ensuring a secure wireless sensor network. In this context we have implemented the arithmetic operations required for the most computationally expensive part of IBE, which is the ...
Diamond, Dermot +2 more
core +1 more source
In the study of three-dimensional underwater sensor networks, the nodes would produce changes in perception range under the influence of environmental factors and their own hardware. Requesting all nodes completely isomorphic is unrealistic.
Junjie Huang +5 more
doaj +1 more source
Wireless sensor networks [PDF]
Havinga, Paul J.M. +2 more
+5 more sources
In conventional directional sensor networks, coverage control for each sensor is based on a 2D directional sensing model. However, 2D directional sensing model failed to accurately characterize the actual application scene of image/video sensor networks.
Junjie Huang +3 more
doaj +1 more source
A Detection Method for Anomaly Flow in Software Defined Network
As a new type of network structure, the Software Defined Network (SDN) provides a new solution for network flow management and optimization, which has made the accurate detection of anomaly SDN flows a hot research topic. This paper presents an SDN-based
Huijun Peng +4 more
doaj +1 more source
Improving energy efficiency in wireless sensor networks through scheduling and routing
This paper is about the wireless sensor network in environmental monitoring applications. A Wireless Sensor Network consists of many sensor nodes and a base station.
A, Sivasubramanian., R, Rathna.
core +1 more source
Online Spectrum Prediction With Adaptive Threshold Quantization
In this paper, we explore the spectrum inference to achieve the spectrum occupancy in advance through analyzing the historical spectrum. We have conceived an offline-online cooperative framework.
Haoyu Li +4 more
doaj +1 more source
Real-time image streaming over a low-bandwidth wireless camera network [PDF]
In this paper we describe the recent development of a low-bandwidth wireless camera sensor network. We propose a simple, yet effective, network architecture which allows multiple cameras to be connected to the network and synchronize their communication ...
Corke, P. +4 more
core +2 more sources
Targeted modulation of IGFL2‐AS1 reveals its translational potential in cervical adenocarcinoma
Cervical adenocarcinoma patients face worse outcomes than squamous cell carcinoma counterparts despite similar treatment. The identification of IGFL2‐AS1's differential expression provides a molecular basis for distinguishing these histotypes, paving the way for personalized therapies and improved survival in vulnerable populations globally.
Ricardo Cesar Cintra +6 more
wiley +1 more source

