Now showing items 5635-5654 of 9750

    TitleAuthorPublication DatePublisherType
    Secrecy outage performance analysis of massive MIMO transmission with multiple non-colluding eavesdroppers and partial legitimate user CSI  Bao T.; Yang H.-C.; Hasna M.O.2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Secrecy performance of AF relaying in cooperative NOMA over rician channel  Zaghdoud N.; Alouane W.H.; Boujemaa H.; Mnaouer A.B.; Touati F.2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Secret Key Agreement for Data Dissemination in Vehicular Platoons  Li K.; Lu L.; Ni W.; Tovar E.; Guizani M.2019Institute of Electrical and Electronics Engineers Inc.Article
    Secretory laccase from pestalotiopsis species CDBT-F-G1 fungal strain isolated from high altitude: Optimization of its production and characterization  Yadav, Mukesh; Bista, Garima; Maharjan, Rocky; Poudyal, Pranita; Mainali, Milan; ... more authors 2019MDPI AGArticle
    Secure and efficient data transmission for cluster-based wireless sensor networks  Lu, Huang; Li, Jie; Guizani, Mohsen2014IEEEArticle
    Secure DoF for the MIMO MAC: The case of knowing eavesdropper's channel statistics only  Amir M.; Khattab T.; Yaacoub E.; Abualsaud K.; Guizani M.2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Secure mHealth IoT data transfer from the patient to the hospital: A three-tier approach  Yaacoub E.; Abualsaud K.; Khattab T.; Guizani M.; Chehab A.2019Institute of Electrical and Electronics Engineers Inc.Article
    Secure Performance of AF and DF Relaying in Cooperative Noma Systems  Zaghdoud N.; Alouane W.H.; Boujemaa H.; Touati F.2019Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Secure policy execution using reusable garbled circuit in the cloud  Alam M.; Emmanuel N.; Khan T.; Khan A.; Javaid N.; ... more authors 2018Elsevier B.V.Article
    Secure smart contract-enabled control of battery energy storage systems against cyber-attacks  Mhaisen N.; Fetais N.; Massoud A.2019Elsevier B.V.Article
    Secure two-user AF relaying networks using cooperative jamming  Mallat W.; Alouane W.H.; Boujemaa H.; Touati F.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Secure UAV communication networks over 5G  Li B.; Fei Z.; Zhang Y.; Guizani M.2019Institute of Electrical and Electronics Engineers Inc.Article
    Secured Fine-Grained Selective Access to Outsourced Cloud Data in IoT Environments  Xia Q.; Sifah E.B.; Obour Agyekum K.O.-B.; Xia H.; Acheampong K.N.; ... more authors 2019Institute of Electrical and Electronics Engineers Inc.Article
    Securitization: Conceptualizing Qatari Foreign Policy
    Alternative Title: الأمن و التصور النظري للسياسة الخارجية القطرية
    
    Dogan, Betul2017Master Thesis
    Security and privacy in emerging networks: Part 1 [Guest Editorial]  Guizani, Mohsen; He, Daojing; Ren, Kui; Rodrigues, Joel; Chan, Sammy; ... more authors 2015IEEEArticle
    Security and privacy preservation in fog-based crowd sensing on the internet of vehicles  Sun G.; Sun S.; Sun J.; Yu H.; Du X.; ... more authors 2019Academic PressArticle
    Security Dynamics of Cloud Computing  Khan, Khaled M.2009Cutter ConsortiumArticle
    Security Performance Analysis of MISOSE Transmission with Random Unitary Beamforming  Bao T.; Yang H.-C.; Hasna M.O.2018Institute of Electrical and Electronics Engineers Inc.Conference Paper
    Security Sector Reform in the Maghreb: Finding a Realistic Approach  Saidy, Brahim2020Moroccan Institute for Policy AnalysisOther
    Security-aware service composition for end users of small enterprises  Khan, K.; Malluhi, Q.2010IOS PressArticle