Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2018 at "Cluster Computing"
DOI: 10.1007/s10586-018-2286-9
Abstract: To expand the usage, reliability, availability of power resources and some distribution system must be met which is conceivable by the support of present day information technologies. This paper concentrates on client support and electricity…
read more here.
Keywords:
based reliable;
transmission scheme;
reliable metering;
data transmission ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Scientific Reports"
DOI: 10.1038/s41598-019-51598-8
Abstract: A novel and traceable quantum steganography scheme based on pixel value differencing (PVD) is proposed. In the proposed scheme, a quantum cover image is divided into non-overlapping blocks of two consecutive pixels. Then, by a…
read more here.
Keywords:
image;
traceable quantum;
value;
scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Scientific Reports"
DOI: 10.1038/s41598-024-76101-w
Abstract: Digital images have become an important way of transmitting information, and the risk of attacks during transmission is increasing. Image watermarking is an important technical means of protecting image information security and plays an important…
read more here.
Keywords:
scheme;
chaotic mapping;
image;
watermarking scheme ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Electronics Letters"
DOI: 10.1049/el.2019.0032
Abstract: Blind signcryption schemes are the extension of signcryption schemes. They are used to protect the privacy and identity of the sender from other users, especially in electronic voting and electronic cash payment systems. A number…
read more here.
Keywords:
signcryption scheme;
blind signcryption;
based elliptic;
signcryption ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Automatika"
DOI: 10.1080/00051144.2018.1426294
Abstract: ABSTRACT Vehicular ad hoc network (VANET) is a traffic application of wireless sensor network, which is also a new mobile ad hoc networks composed of vehicle nodes, roadside units, service providers and other components. In…
read more here.
Keywords:
vanet;
based fair;
fair blind;
scheme based ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "International Journal of Computer Mathematics"
DOI: 10.1080/00207160.2025.2493959
Abstract: In this paper, we propose a verifiable multi-secret sharing scheme based on quadratic residue (QR) codes that are linear complementary dual (LCD). By this method, the shareholders can verify each other by putting their shares…
read more here.
Keywords:
multi secret;
verifiable multi;
secret sharing;
quadratic residue ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Laser Physics"
DOI: 10.1088/1555-6611/add002
Abstract: Visual cryptography (VC) schemes rely on the human visual system to protect image content. Due to their security, simplicity and ease of use, they have been widely applied in various information security scenarios. However, they…
read more here.
Keywords:
scheme;
visual cryptography;
type optical;
new type ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2018.2888638
Abstract: To ensure an efficient coverage and allow transparent mobility, it is common to find a number of access points (APs) deployed in the neighborhood of each other in current WLANs. A mobile terminal (MT) often…
read more here.
Keywords:
achievable throughputs;
based achievable;
scheme based;
selection ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2897721
Abstract: This paper devotes to the image compression and encryption problems. We develop a novel hybrid scheme based on block compressive sensing. Concentrate on taking full advantage of the different frequency coefficients sparsity, the nonuniform sampling…
read more here.
Keywords:
nonuniform sampling;
scheme;
compressive sensing;
image ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "IEEE Access"
DOI: 10.1109/access.2019.2936511
Abstract: Spectrum sensing is an indispensable technology for cognitive radio networks, which enables secondary users (SUs) to discover spectrum holes and to opportunistically use under-utilized channels without causing interference to primary users. Aim at improving the…
read more here.
Keywords:
main information;
scheme based;
information;
spectrum sensing ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3205312
Abstract: Recently, numerical relays with communication capabilities have been employed to provide adaptive solutions for Distributed Generations (DGs) protection issues. This paper presents an adaptive protection scheme based on centralized and decentralized communication to address DG…
read more here.
Keywords:
protection;
communication;
protection scheme;
scheme based ... See more keywords