-
401
Cryptanalysis of improved password authentication scheme with smart cards
Published 2008“…We prove that, in spite of the improvement of Yang-Wang-Chang's scheme, Kim et al.'s solution is still vulnerable to a type of forgery attack. …”
Get full text
Proceeding Paper -
402
-
403
-
404
-
405
-
406
A study on potential application and people awareness on green infrastructure for boulevard: a case study of Putrajaya boulevard
Published 2013“…The interviews with landscape architects, planners, and engineers are conducted to identify the guidelines and principle of green infrastructure applied at the Putrajaya Boulevard. Based on the findings, eleven types of green infrastructure in managing the energy use and climate control can be applied for the boulevard. …”
Get full text
Get full text
Proceeding Paper -
407
Electrochemical characterization of polylactic acid-block-poly(2-vinylpyridine)/gold nanoparticle (aunp) composites for glucose biosensor development
Published 2016“…The hybridizations between gold precursors and the P2VP domain were prepared with different ratios of gold to P2VP block (1:1, 1:5, 1:10, 5:1, 10:1) by taking advantage of the association between the long-pair nitrogen of the pyridine group of P2VP. …”
Get full text
Proceeding Paper -
408
Curve tracking of nonlinear dynamic system using linear state-space model
Published 2024Get full text
Conference or Workshop Item -
409
-
410
A comprehensive review of studies focusing on the intersection of urban flooding and historic urban landscapes
Published 2023Get full text
Conference or Workshop Item -
411
Secure Group Association Management in Heterogeneous Distributed Sensor Networks
Published 2008Get full text
Article -
412
-
413
Security attacks and challenges in wireless sensor networks
Published 2009Get full text
Book Chapter -
414
-
415
An efficient bilateral remote user authentication scheme with smart cards
Published 2006Get full text
Article -
416
Developing an efficient DMCIS with next-generation wireless networks
Published 2006Get full text
Proceeding Paper -
417
Secure clustering in DSN with key predistribution and WCDS
Published 2006Get full text
Proceeding Paper -
418
Attacks on Shen et. al.’s remote user authentication scheme and defense*
Published 2006Get full text
Proceeding Paper -
419
An improved timestamp-based password authentication scheme with two-party verification using smart cards
Published 2007Get full text
Proceeding Paper -
420
An efficient scheme for secure data transmission in wireless sensor networks
Published 2007Get full text
Proceeding Paper