Search
Now showing items 1-10 of 721
Principles and overview of network steganography
Publisher: IEEE
Year: 2014
Cryptanalysis of Wang et al.'s improved anonymous multi-receiver identity-based encryption scheme
Publisher: IET
Year: 2014
Achieving Perfect Secrecy by pdf-Bandlimited Jamming
Publisher: IEEE
Year: 2014
A multi-material Q-boosted low phase noise optomechanical oscillator
Publisher: IEEE
Year: 2014
Chinese remainder theorem based centralised group key management for secure multicast communication
Publisher: IET
Year: 2014
Access point selection mechanism to circumvent rogue access points using voting-based query procedure
Publisher: IET
Year: 2014
A Survey on Security Aspects for LTE and LTE-A Networks
Publisher: IEEE
Year: 2014
Compressed sensing based hyperspectral unmixing
Publisher: IEEE
Year: 2014
A fault-tolerant power conversion topology for PMSG based Wind Power Systems
Publisher: IEEE
Year: 2014