Journal articles on the topic 'Hierarchical schemes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hierarchical schemes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Si, Jing Jing. "A Hierarchical Multicast Scheme for Heterogeneous Receivers." Advanced Materials Research 108-111 (May 2010): 57–62. http://dx.doi.org/10.4028/www.scientific.net/amr.108-111.57.
Full textAlam, Irfan, Amal S. Alali, Shakir Ali, and Muhammad S. M. Asri. "A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure." Axioms 13, no. 8 (2024): 515. http://dx.doi.org/10.3390/axioms13080515.
Full textQihong Yu, Qihong Yu, Jian Shen Qihong Yu, Jin-Feng Lai Jian Shen, and Sai Ji Jin-Feng Lai. "Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption." 網際網路技術學刊 23, no. 6 (2022): 1287–96. http://dx.doi.org/10.53106/160792642022112306011.
Full textSun, Lin Lin, Chun An You, Jian Xin Liu, and Qiu Yuan Liu. "Research on Treatment Scheme Optimization for Slope Based on Analytic Hierarchy Process." Applied Mechanics and Materials 90-93 (September 2011): 402–5. http://dx.doi.org/10.4028/www.scientific.net/amm.90-93.402.
Full textTOCHIKUBO, Kouya. "General Secret Sharing Schemes Using Hierarchical Threshold Scheme." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A, no. 9 (2019): 1037–47. http://dx.doi.org/10.1587/transfun.e102.a.1037.
Full textChen, Chien-Ming, Xinying Zheng, and Tsu-Yang Wu. "A Complete Hierarchical Key Management Scheme for Heterogeneous Wireless Sensor Networks." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/816549.
Full textLangrehr, Roman, and Jiaxin Pan. "Tightly Secure Hierarchical Identity-Based Encryption." Journal of Cryptology 33, no. 4 (2020): 1787–821. http://dx.doi.org/10.1007/s00145-020-09356-x.
Full textWu, Miqi, Lin You, Gengran Hu, Liang Li, and Chengtang Cao. "A Blockchain-Based Hierarchical Authentication Scheme for Multiserver Architecture." Security and Communication Networks 2021 (April 22, 2021): 1–20. http://dx.doi.org/10.1155/2021/5592119.
Full textZhao, Nan Nan, and Jian Bo Yao. "Hybrid Key Management Scheme for WSN." Applied Mechanics and Materials 513-517 (February 2014): 424–30. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.424.
Full textTian, Qiuting, Dezhi Han, and Yanmei Jiang. "Hierarchical authority based weighted attribute encryption scheme." Computer Science and Information Systems 16, no. 3 (2019): 797–813. http://dx.doi.org/10.2298/csis180912027t.
Full textZARANDI, HAMID R., and SEYED GHASSEM MIREMADI. "HIERARCHICAL SET-ASSOCIATE CACHE FOR HIGH-PERFORMANCE AND LOW-ENERGY ARCHITECTURE." Journal of Circuits, Systems and Computers 15, no. 06 (2006): 861–80. http://dx.doi.org/10.1142/s0218126606003404.
Full textFarras, Oriol, and Carles Padro. "Ideal Hierarchical Secret Sharing Schemes." IEEE Transactions on Information Theory 58, no. 5 (2012): 3273–86. http://dx.doi.org/10.1109/tit.2011.2182034.
Full textGunther, O., and S. Dominguez. "Hierarchical schemes for curve representation." IEEE Computer Graphics and Applications 13, no. 3 (1993): 55–63. http://dx.doi.org/10.1109/38.210492.
Full textWang, Caimei, Jianzhong Pan, Jianhao Lu, and Zhize Wu. "A Data Hierarchical Encryption Scheme Based on Attribute Hiding under Multiple Authorization Centers." Electronics 13, no. 1 (2023): 125. http://dx.doi.org/10.3390/electronics13010125.
Full textWilliams, Lowri, Eirini Anthi, and Pete Burnap. "Comparing Hierarchical Approaches to Enhance Supervised Emotive Text Classification." Big Data and Cognitive Computing 8, no. 4 (2024): 38. http://dx.doi.org/10.3390/bdcc8040038.
Full textМишачев, Н. М., А. М. Шмырин, and А. П. Щербаков. "TWO SCHEMES FOR HIERARCHICAL IDENTIFICATION OF QUASILINEAR MODELS." ВЕСТНИК ВОРОНЕЖСКОГО ГОСУДАРСТВЕННОГО ТЕХНИЧЕСКОГО УНИВЕРСИТЕТА, no. 1 (March 10, 2023): 7–13. http://dx.doi.org/10.36622/vstu.2023.19.1.001.
Full textYeh, Jyh-haw. "Enforcing non-hierarchical access policies by hierarchical key assignment schemes." Information Processing Letters 110, no. 2 (2009): 46–49. http://dx.doi.org/10.1016/j.ipl.2009.10.005.
Full textLi, Xiaoyu, Min Ye, Jiahui Chen, Jianhui Chen, and Yeh-Cheng Chen. "A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT." Security and Communication Networks 2021 (December 6, 2021): 1–12. http://dx.doi.org/10.1155/2021/6174506.
Full textWang, Hao, Liangyin Chen, Shijia Liu, et al. "Trajectory-Based Hierarchical Adaptive Forwarding in Vehicular Ad Hoc Networks." Journal of Sensors 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/4236789.
Full textLigeti, Peter, Peter Sziklai, and Marcella Takáts. "Generalized threshold secret sharing and finite geometry." Designs, Codes and Cryptography 89, no. 9 (2021): 2067–78. http://dx.doi.org/10.1007/s10623-021-00900-9.
Full textZhenhua Tan, Danke Wu, Hong Li, Tianhan Gao, and Nan Guo. "Hierarchical Threshold Secret Image Sharing Scheme Based on Birkhoff Interpolation and Matrix Projection." Research Briefs on Information and Communication Technology Evolution 4 (October 15, 2018): 125–33. http://dx.doi.org/10.56801/rebicte.v4i.73.
Full textWu, Hanbo, Xin Ma, and Yibin Li. "Hierarchical dynamic depth projected difference images–based action recognition in videos with convolutional neural networks." International Journal of Advanced Robotic Systems 16, no. 1 (2019): 172988141882509. http://dx.doi.org/10.1177/1729881418825093.
Full textHe, Kai, Min-Rong Chen, Yijun Mao, Xi Zhang, and Yiju Zhan. "Efficient Hierarchical Identity-Based Encryption for Mobile Ad Hoc Networks." Mobile Information Systems 10, no. 4 (2014): 407–25. http://dx.doi.org/10.1155/2014/710362.
Full textZhang, En, Jun-Zhe Zhu, Gong-Li Li, Jian Chang, and Yu Li. "Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation." Security and Communication Networks 2019 (October 10, 2019): 1–8. http://dx.doi.org/10.1155/2019/6989383.
Full textHe, Yan, Baodong Qin, Wen Gao, Dong Zheng, and Qianqian Zhao. "Generic Construction of Forward-Secure Revocable Identity-Based Signature and Lattice-Based Instantiations." Security and Communication Networks 2022 (November 16, 2022): 1–12. http://dx.doi.org/10.1155/2022/7494452.
Full textLi, Chun Yuan, Xiao Tong Zhang, Yue Qi, Li Wen He, Hong Song Chen, and Xue Ying Zhang. "A New Key Management Scheme for Hierarchical Wireless Sensor Network." Applied Mechanics and Materials 385-386 (August 2013): 1622–25. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1622.
Full textHe, Bing-Zhe, Chien-Ming Chen, Tsu-Yang Wu, and Hung-Min Sun. "An Efficient Solution for Hierarchical Access Control Problem in Cloud Environment." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/569397.
Full textMizutani, Kimihiro. "Effective TCP Flow Management Based on Hierarchical Feedback Learning in Complex Data Center Network." Sensors 22, no. 2 (2022): 611. http://dx.doi.org/10.3390/s22020611.
Full textSantis, Alfredo De, Anna Lisa Ferrara, and Barbara Masucci. "Efficient provably-secure hierarchical key assignment schemes." Theoretical Computer Science 412, no. 41 (2011): 5684–99. http://dx.doi.org/10.1016/j.tcs.2011.06.024.
Full textShen, Yong Luo, Jun Zhang, Di Wei Yang, and Lin Bo Luo. "A Bezier Curve Based Key Management Scheme for Hierarchical Wireless Sensor Networks." Applied Mechanics and Materials 263-266 (December 2012): 2979–85. http://dx.doi.org/10.4028/www.scientific.net/amm.263-266.2979.
Full textYang, Zhichao, Dung H. Duong, Willy Susilo, Guomin Yang, Chao Li, and Rongmao Chen. "Hierarchical Identity-Based Signature in Polynomial Rings." Computer Journal 63, no. 10 (2020): 1490–99. http://dx.doi.org/10.1093/comjnl/bxaa033.
Full textZhang, Lingyu, Yun Kong, Youlong Wu, and Minquan Cheng. "Hierarchical Cache-Aided Networks for Linear Function Retrieval." Entropy 26, no. 3 (2024): 195. http://dx.doi.org/10.3390/e26030195.
Full textJiang, She‑Xiang, and Qi-Ke Zhang. "Multi-level hierarchical multi-hop quantum teleportation based on GHZ-Bell states." Physica Scripta 100, no. 8 (2025): 085104. https://doi.org/10.1088/1402-4896/adecca.
Full textMANIADAKIS, MICHAIL, and PANOS TRAHANIAS. "HIERARCHICAL COOPERATIVE CoEVOLUTION: PRESENTATION AND ASSESSMENT STUDY." International Journal on Artificial Intelligence Tools 18, no. 01 (2009): 99–120. http://dx.doi.org/10.1142/s0218213009000068.
Full textLin, Yan, Hongliang Zhu, Guoai Xu, and Guosheng Xu. "Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations." International Journal of Distributed Sensor Networks 18, no. 3 (2022): 155013292210887. http://dx.doi.org/10.1177/15501329221088740.
Full textHe, Xingyu, Xianhua Niu, Yangpeng Wang, Ling Xiong, Zhizhong Jiang, and Cheng Gong. "A Hierarchical Blockchain-Assisted Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks." Sensors 22, no. 6 (2022): 2299. http://dx.doi.org/10.3390/s22062299.
Full textCHEN, Peixin, Yilun WU, Jinshu SU, and Xiaofeng WANG. "Comparing Performance of Hierarchical Identity-Based Signature Schemes." IEICE Transactions on Information and Systems E99.D, no. 12 (2016): 3181–84. http://dx.doi.org/10.1587/transinf.2016edl8136.
Full textHwang, Shiow‐Fen, Kun‐Hsien Lu, Tsung‐Hsiang Chang, and Chyi‐Ren Dow. "Hierarchical data gathering schemes in wireless sensor networks." International Journal of Pervasive Computing and Communications 4, no. 3 (2008): 299–321. http://dx.doi.org/10.1108/17427370810911649.
Full textBortnikov, E., and R. Cohen. "Schemes for scheduling control messages by hierarchical protocols." Computer Communications 24, no. 7-8 (2001): 731–43. http://dx.doi.org/10.1016/s0140-3664(00)00276-0.
Full textTel, Gerard, and Harry A. G. Wijshoff. "Hierarchical parallel memory systems and multiperiodic skewing schemes." Journal of Parallel and Distributed Computing 7, no. 2 (1989): 355–67. http://dx.doi.org/10.1016/0743-7315(89)90025-7.
Full textAteniese, Giuseppe, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci. "Provably-Secure Time-Bound Hierarchical Key Assignment Schemes." Journal of Cryptology 25, no. 2 (2010): 243–70. http://dx.doi.org/10.1007/s00145-010-9094-6.
Full textRousseau, Pascale, and David Sankoff. "The inference of hierarchical schemes for multinomial data." Journal of Classification 6, no. 1 (1989): 73–95. http://dx.doi.org/10.1007/bf01908589.
Full textAwerbuch, Baruch, Yi Du, Bilal Khan, and Yuval Shavitt. "Routing through networks with hierarchical topology aggregation." Journal of High Speed Networks 7, no. 1 (1998): 57–73. https://doi.org/10.3233/hsn-1998-138.
Full textThomson, Stephen I., and Geoffrey K. Vallis. "Hierarchical Modeling of Solar System Planets with Isca." Atmosphere 10, no. 12 (2019): 803. http://dx.doi.org/10.3390/atmos10120803.
Full textZhang, Yinghui, Menglei Yang, Dong Zheng, Tiantian Zhang, Rui Guo, and Fang Ren. "Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity." International Journal of Foundations of Computer Science 30, no. 04 (2019): 665–81. http://dx.doi.org/10.1142/s0129054119400197.
Full textLatash, Mark L., and J. Greg Anson. "Does controlling movement require intelligence?" Behavioral and Brain Sciences 20, no. 3 (1997): 533–36. http://dx.doi.org/10.1017/s0140525x97221527.
Full textBarthel, Kai Uwe. "Entropy Constrained Fractal Image Coding." Fractals 05, supp01 (1997): 17–26. http://dx.doi.org/10.1142/s0218348x97000607.
Full textXu, Guoai, Jiangtao Yuan, Guosheng Xu, and Zhongkai Dang. "An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations." Security and Communication Networks 2021 (July 20, 2021): 1–8. http://dx.doi.org/10.1155/2021/5566179.
Full textAshraf, M. Wasim Abbas, Chuanhe Huang, Shehzad Khalid, Amir Saeed Rana, Mudassar Ahmad, and Umar Raza. "Dynamic Naming Scheme and Lookup Method Based on Trie for Vehicular Named Data Network." Wireless Communications and Mobile Computing 2022 (May 19, 2022): 1–13. http://dx.doi.org/10.1155/2022/6539532.
Full textShiraly, Danial, Nasrollah Pakniat, and Ziba Eslami. "Designated-Server Hierarchical Searchable Encryption in Identity-Based Setting." ISC International Journal of Information Security 15, no. 3 (2023): 1–16. https://doi.org/10.22042/isecure.2023.416676.1014.
Full text