-
91
المؤلفون: Laurent Njilla, Daniel Bowden, Xueping Liang, Charles A. Kamhoua, Sachin Shetty, Deepak K. Tosh
المصدر: EAI Endorsed Transactions on Pervasive Health and Technology, Vol 4, Iss 15 (2018)
مصطلحات موضوعية: Data sharing, Blockchain, lcsh:Medical technology, lcsh:R855-855.5, Computer science, business.industry, Internet privacy, Health care, lcsh:R, Computer Science (miscellaneous), lcsh:Medicine, Health Informatics, business
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::32e17d740fc0915b523923b205be4c8eTest
https://eudl.eu/pdf/10.4108/eai.24-7-2018.159338Test -
92
المؤلفون: Marco A. Gamarra, Sachin Shetty, David M. Nicol, Laurent Njilla, Charles A. Kamhoua, Oscar Gonazlez
المصدر: ICC
مصطلحات موضوعية: 0209 industrial biotechnology, 020901 industrial engineering & automation, Theoretical computer science, Computer science, Stepping stone, Shortest path problem, 02 engineering and technology, Network topology, Graph, Computer Science::Cryptography and Security
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::2113ce248720d205d5e08697cbc768b6Test
https://doi.org/10.1109/icc.2018.8422723Test -
93
المؤلفون: Moses Garuba, Laurent Njilla, Geremew Begna, Danda B. Rawat
المصدر: CNS
مصطلحات موضوعية: Distributed database, Computer science, business.industry, Wireless network, Distributed computing, Big data, Volume (computing), 020206 networking & telecommunications, Context (language use), Cloud computing, Cryptography, 02 engineering and technology, 020204 information systems, Distributed data store, 0202 electrical engineering, electronic engineering, information engineering, business
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::7bbed895084591b8b7d93655916145c9Test
https://doi.org/10.1109/cns.2018.8433144Test -
94
المؤلفون: Laurent Njilla, Muhammad Saad, Kevin Kwait, Aziz Mohaisen, Charles A. Kamhoua
المصدر: 2018 IEEE International Conference on Communications (ICC).
مصطلحات موضوعية: Finance, Notice, Computer science, business.industry, Double spending, business
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::697b58028080d73101cf58fbf0a98f8cTest
https://doi.org/10.1109/icc.2018.8423019Test -
95
المؤلفون: Charles A. Kamhoua, Laurent Njilla, Yuanxiong Guo, Yanmin Gong
المصدر: INFOCOM Workshops
مصطلحات موضوعية: Computer science, 020209 energy, Stochastic game, Cyber-physical system, Physical system, Physical layer, Markov process, 02 engineering and technology, Computer security, computer.software_genre, symbols.namesake, Nash equilibrium, 0202 electrical engineering, electronic engineering, information engineering, symbols, Cyber-attack, Markov decision process, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::79faaa5d319db6e31dadf296a8c584eeTest
https://doi.org/10.1109/infcomw.2018.8406833Test -
96
المؤلفون: Aziz Mohaisen, Laurent Njilla, Jemon Park, Omar Al-Ibrahim, Charlies Kamhoua, Hisham Alasmary, Kevin Kwiat
المصدر: ICASSP
مصطلحات موضوعية: 021110 strategic, defence & security studies, Computer science, Process (engineering), Information sharing, media_common.quotation_subject, 05 social sciences, 0211 other engineering and technologies, 050801 communication & media studies, 02 engineering and technology, Data science, 0508 media and communications, Relevance (information retrieval), Quality (business), Metric (unit), Set (psychology), media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::c12a15d5322cd65026be47c596e460d7Test
https://doi.org/10.1109/icassp.2018.8462036Test -
97
المؤلفون: Laurent Njilla, Qiaoyan Yu, Charles A. Kamhoua, Zhiming Zhang
المصدر: HOST
مصطلحات موضوعية: Reverse engineering, 021110 strategic, defence & security studies, Authentication, Exploit, Computer science, business.industry, 0211 other engineering and technologies, 02 engineering and technology, computer.software_genre, 020202 computer hardware & architecture, Hardware Trojan, Embedded system, 0202 electrical engineering, electronic engineering, information engineering, Code (cryptography), Key (cryptography), Hit rate, Hardware_ARITHMETICANDLOGICSTRUCTURES, Field-programmable gate array, business, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::f6fc1d1d8a740a6a1c63f91c1f0ab496Test
https://doi.org/10.1109/hst.2018.8383907Test -
98
المصدر: INFOCOM Workshops
مصطلحات موضوعية: FOS: Computer and information sciences, 021110 strategic, defence & security studies, business.industry, Computer science, Information Theory (cs.IT), Computer Science - Information Theory, media_common.quotation_subject, Transmitter, 0211 other engineering and technologies, 020206 networking & telecommunications, Jamming, 02 engineering and technology, Computer security, computer.software_genre, Secrecy, 0202 electrical engineering, electronic engineering, information engineering, Stackelberg competition, Quality (business), Cooperative behavior, Internet of Things, business, computer, Reputation, media_common
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9d813e7ee7d6216163dfc07ed0e963d0Test
https://doi.org/10.1109/infcomw.2018.8406970Test -
99
المؤلفون: Charles A. Kamhoua, Zhiming Zhang, Qiaoyan Yu, Kevin Kwiat, Laurent Njilla
المصدر: ISQED
مصطلحات موضوعية: Hardware security module, business.industry, Computer science, Cycles per instruction, 020208 electrical & electronic engineering, Legacy system, 02 engineering and technology, 020202 computer hardware & architecture, Hardware Trojan, Gate array, Trojan, Embedded system, 0202 electrical engineering, electronic engineering, information engineering, Bitstream, business, Field-programmable gate array
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::95f2c3934ea007a02a1e92dd999bfed5Test
https://doi.org/10.1109/isqed.2018.8357320Test -
100
المؤلفون: Charles A. Kamhoua, Danda B. Rawat, Laurent Njilla, Kevin Kwiat
المصدر: ICNC
مصطلحات موضوعية: Information management, Digital signature, Computer science, Information sharing, Financial transaction, Stackelberg competition, Confidentiality, Adversary, Cyberspace, Computer security, computer.software_genre, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::6254402daf43b0d02e1304495a76ce32Test
https://doi.org/10.1109/iccnc.2018.8390264Test