Zobrazeno 1 - 10
of 96
pro vyhledávání: '"Kashif Sharif"'
Autor:
Dan Zheng, Abdullah Addas, Liaqat Ali Waseem, Syed Ali Asad Naqvi, Muneeb Ahmad, Kashif Sharif
Publikováno v:
PLoS ONE, Vol 19, Iss 8, p e0297413 (2024)
The study draws attention to the associations between monetary and economic elements and their potential environmental impacts. The study uses time series data from 1960 to 2022 to examine the connection between CO2 emissions, industrial growth, GNE,
Externí odkaz:
https://doaj.org/article/369cbd5539204b8da7c38234376ebc8b
Autor:
Dan Zheng, Abdullah Addas, Liaqat Ali Waseem, Syed Ali Asad Naqvi, Muneeb Ahmad, Kashif Sharif
Publikováno v:
PLoS ONE, Vol 19, Iss 8, p e0309444 (2024)
[This corrects the article DOI: 10.1371/journal.pone.0297413.].
Externí odkaz:
https://doaj.org/article/2b641451ba1348ac9f708d1d15868259
Publikováno v:
Mathematics, Vol 11, Iss 3, p 532 (2023)
The technique of group secret handshake (GSH) has been used to help the members affiliated with the same group in achieving private authentication. After executing GSH protocols, the participants affiliated with the group can compute a shared secret
Externí odkaz:
https://doaj.org/article/b1c0a35fde5645079941b60e19590547
Publikováno v:
Sensors, Vol 22, Iss 21, p 8434 (2022)
Software-defined networking (SDN) has gained tremendous growth and can be exploited in different network scenarios, from data centers to wide-area 5G networks. It shifts control logic from the devices to a centralized entity (programmable controller)
Externí odkaz:
https://doaj.org/article/f5c0733ebd124947a9b0055dd70bc470
Publikováno v:
IEEE Access, Vol 7, Pp 75476-75489 (2019)
Proof of Storage (POS) is a system utilized by a client to verify whether the original data is intact while being possessed by an untrusted server. In a grouping application, multiple members share and verify the same file, and the group manager is r
Externí odkaz:
https://doaj.org/article/bec9952139c44527982fca997220a483
Publikováno v:
IEEE Access, Vol 5, Pp 27311-27321 (2017)
Public social environments are hot beds of security leaks, either they are virtual or physical. The nature of social settings allows numerous people to co-exist in the same space. This close un-bounded proximity opens up the possibility of privacy co
Externí odkaz:
https://doaj.org/article/a3fa62db17c44d08bde1ae80227a6fc4
Publikováno v:
IEEE Transactions on Vehicular Technology. 72:2453-2467
Publikováno v:
IEEE Transactions on Sustainable Computing. :1-13
Publikováno v:
IEEE Consumer Electronics Magazine. 12:43-51
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 33:4835-4848