Search
Now showing items 61-62 of 62
Vulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks
(
IEEE
, 2012 , Conference Paper)
In network security goals such as confidentiality, authentication, integrity and non-repudiation can be achieved using cryptographic techniques. Cryptographic techniques are techniques to hide information from unauthorized ...
Fuzzy model for detection and estimation of the degree of autism spectrum disorder
(
Springer Nature
, 2012 , Conference Paper)
Early detection of autism spectrum disorder (ASD) is of great significance for early intervention. Besides, knowing the degree of severity in ASD and how it changes with the intervention is imperative for the treatment ...