![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
A Novel Blockchain-Based Revocable Permission Management on CP-ABE Scheme
Relying on the characteristics of decentralized, tamper-proof, and traceable, blockchain technology has begun to be widely used in permission management. It can be used for access control by using smart contra...
-
Chapter and Conference Paper
Neural Control Based Research of Endogenous Security Model
With the development of information technology, the architecture of information system has become increasingly complex, and the performance of terminal equipment has become stronger. The existing centralized d...
-
Chapter and Conference Paper
Automated Authentication of Large-Scale IoT Devices with Hybrid Feature Selection
Nowadays, large-scale IoT (Internet of Things) devices are connected to the network. However, due to the simplicity, limited memory and poor computing power of most IoT devices, it is difficult to apply comple...
-
Article
Throughput and BER of wireless powered DF relaying in Nakagami-m fading
Energy harvesting provides a promising solution to the extra energy requirement at the relay due to relaying. In this paper, the throughput and bit error rate of a decode-and-forward relaying system are studie...