Zobrazeno 1 - 10
of 162
pro vyhledávání: '"Haibin Kan"'
Publikováno v:
IET Information Security, Vol 15, Iss 1, Pp 87-97 (2021)
Abstract In 2012, Carlet et al. developed two secondary constructions of bent functions (Advances in Mathematics of Communications, 6: 305‐314) and proposed some applications for their constructions. However, the duals of bent functions in their co
Externí odkaz:
https://doaj.org/article/5fa25daebf344797850a5c6144c89d7b
Publikováno v:
IEEE Access, Vol 8, Pp 222377-222384 (2020)
In 2018, Tang and Maitra presented a class of balanced Boolean functions in $n$ variables with the absolute indicator $\Delta _{f}< 2^{n/2}$ and the nonlinearity $NL(f)> 2^{n-1}-2^{n/2}$ , that is, $f$ is SAO (strictly almost optimal), for $n=2k\equi
Externí odkaz:
https://doaj.org/article/f976a9e71d7e490795acadd48f332670
Autor:
Anum Nawaz, Jorge Peña Queralta, Jixin Guan, Muhammad Awais, Tuan Nguyen Gia, Ali Kashif Bashir, Haibin Kan, Tomi Westerlund
Publikováno v:
Sensors, Vol 20, Iss 14, p 3965 (2020)
With an increasing penetration of ubiquitous connectivity, the amount of data describing the actions of end-users has been increasing dramatically, both within the domain of the Internet of Things (IoT) and other smart devices. This has led to more a
Externí odkaz:
https://doaj.org/article/882b5dec5e2847fca608a1e056b29d34
Publikováno v:
published in the Computer Journal, 2021
The power-law behavior is ubiquitous in a majority of real-world networks, and it was shown to have a strong effect on various combinatorial, structural, and dynamical properties of graphs. For example, it has been shown that in real-life power-law n
Externí odkaz:
http://arxiv.org/abs/2104.00944
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :600-605
Publikováno v:
IEEE Transactions on Services Computing. :1-12
Publikováno v:
IEEE Transactions on Mobile Computing. 22:159-174
In this paper, we study sensing data collection of IoT devices in a sparse IoT-sensor network, using an energy-constrained Unmanned Aerial Vehicle (UAV), where the sensory data is stored in IoT devices while the IoT devices may or may not be within t
Publikováno v:
IEEE Transactions on Information Theory. 68:7528-7537
In 2020, Budaghyan, Helleseth and Kaleyski [IEEE TIT 66(11): 7081-7087, 2020] considered an infinite family of quadrinomials over $\mathbb{F}_{2^{n}}$ of the form $x^3+a(x^{2^s+1})^{2^k}+bx^{3\cdot 2^m}+c(x^{2^{s+m}+2^m})^{2^k}$, where $n=2m$ with $m
Publikováno v:
IEEE MultiMedia. 29:97-110
Publikováno v:
The Computer Journal.
Fair exchange is a challenging problem for two mutually distrusting players. It is widely known that fair exchange is impossible without a trusted third party (TTP). However, relying on a single TTP can cause a single-point failure. An intuitive idea