e-Marefa
eMarefa Database
Home
Services
ARCIF
Bookmarks
Contact us
اللغة
الإنجليزية
العربية
Sign in
Search
Browse
All
Title
Authors / Persons
Institute
Search
Advanced search
Advanced Search
Search Controls
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
AND
OR
NOT
All
Abstract
Authors/ Persons
Country
Institute
ISSN / ISBN
Main Topic
Record ID
Source
Table of Contents
Title
Topics
Article Limiters
Has Full Text
Phrase
Contains Phrase
Exact Phrase
Any Word
اللغة
Arabic
English
French
# Pages
Equal to
Less than
Greater than
Pages
Document Type
Journal Articles
Book
Book chapters
Journals
International Theses
Arab Theses
Conference Papers
Book Reviews
Statistical Reports
Annual Reports
Conference
Thesaurus
Academic Programs
Awards
Concepts and Terminology
Institute
Poll Question
Fatawa
Training Courses
Public Opinion Polls
Resolutions
Person
Governance
Articles of association
Auditing Reports
Laws
Corporate Report
Monographic Series
Quarterly Reports
Conference Review
Textbook
Textbook Chapter
From
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
To
2024
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
1999
1998
1997
1996
1995
1994
1993
1992
1991
1990
1989
1988
1987
1986
1985
1984
1983
1982
1981
1980
1979
1978
1977
1976
1975
1974
1973
1972
1971
1970
1969
1968
1967
1966
1965
1964
1963
1962
1961
1960
Filters
Main Subjects
Information Technology and Computer Science
(28)
Civil Engineering
(4)
Philosophy
(3)
Data Type
Journal Articles
(39)
Language
English
(39)
Country
Egypt
(39)
Authors / Persons
Wang, Ding
(39)
Shen, Yang-Wu
(3)
Source
Wireless Communications and Mobile Computing
(25)
Complexity
(3)
Security and Communication Networks
(3)
Institute
Hindawi Publishing Corporation Cairo, Egypt :
(39)
Range:
Search Results
(
1
-
39
of
39
)
Relevance
Publish Date Asc
Publish Date Desc
Title Asc
Title Desc
Author Asc
Author Desc
Journal Articles
Determining the Image Base of Smart Device Firmware for Security Analysis
By: Zhu, Ruijin; Zhang, Baofeng; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Data-Driven Cybersecurity Knowledge Graph Construction for Industrial Control System Security
By: Qin, Ya; Wang, Ding; Yu, Miao…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
Analysis of the Influence of Renewable Generator Frequency Endurance Capability on Low-Frequency Load Shedding: A Hunan Case Study
By: Xu, Min; Cao, Wei; Chen, Qiang…[et al.]. Complexity. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
Study on Security and Privacy in 5G-Enabled Applications
By: Qiu, Qin; Liu, Shenglan; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-15, 15 p.
Journal Articles
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices
By: Huang, Qinglong; Huang, Haiping; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-9, 9 p.
Journal Articles
A Multiclass Detection System for Android Malicious Apps Based on Color Image Features
By: Zhang, Hua; Gao, Fei; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-21, 21 p.
Journal Articles
A Novel DIBR 3D Image Hashing Scheme Based on Pixel Grouping and NMF
By: Cui, Chen; Wu, Xujun; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
An Algorithm Based on Influence to Predict Invisible Relationship
By: Tian, Junfeng; Xue, Lizheng; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Modified Password Guessing Methods Based on TarGuess-I
By: Li, Zhenhan; Wang, Hongjun; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-22, 22 p.
Journal Articles
Privacy-Protection Scheme Based on Sanitizable Signature for Smart Mobile Medical Scenarios
By: Kumar, Neeraj; Li, Li; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-10, 10 p.
Journal Articles
Improved Conditional Differential Analysis on NLFSR-Based Block Cipher KATAN32 with MILP
By: Xing, Zhaohui; Zhang, Wenying; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
Privacy-Preserving Graph Operations for Mobile Authentication
By: Li, Peng; Zhou, Fucai; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-13, 13 p.
Journal Articles
A Secure and Verifiable Outsourcing Scheme for Assisting Mobile Device Training Machine Learning Model
By: Li, Cheng; Ma, Jianfeng; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-16, 16 p.
Journal Articles
A Security Situation Assessment Model of Information System for Smart Mobile Devices
By: Xie, Lixia; Yan, Liping; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-11, 11 p.
Journal Articles
An Efficient Anonymous Authentication Scheme for Mobile Pay-TV Systems
By: Li, Yuting; Cheng, Qingfeng; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Analysis of Dynamic Damage-Induced Porosity Changes of Granites in Leaching Mining Technique Based on SHPB Test
By: Liu, Changwu; He, Zhiliang; Wu, Haikuan…[et al.]. Geofluids. No. 2020 (2020), pp.1-12, 12 p.
Journal Articles
Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices
By: Li, Hui; Pan, Xuesong; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2020 (2020), pp.1-14, 14 p.
Journal Articles
A Lagrangian Multiplier Method for TDOA and FDOA Positioning of Multiple Disjoint Sources with Distance and Velocity Correlation Constraints
By: Yang, Bin; Yang, Zeyu; Vipiana, Francesca…[et al.]. Mathematical Problems in Engineering. No. 2020 (2020), pp.1-23, 23 p.
Journal Articles
Review of Modified Nickel-Cobalt Lithium Aluminate Cathode Materials for Lithium-Ion Batteries
By: Wang, Ding; Liu, Weihong; Xiao, Wei…[et al.]. International Journal of Photoenergy. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Harmonic Modeling and Experimental Validation of the Converters of DFIG-Based Wind Generation System
By: Shen, Yang-Wu; Wang, Ding; Kim, Taesic…[et al.]. Complexity. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Serum Expression of β-Catenin Is a Potential Detection Marker in Patients with Colorectal Cancer
By: Li, Shue; Huang, Mao; Nicolazzo, Chiara…[et al.]. Disease Markers. No. 2019 (2019), pp.1-8, 8 p.
Journal Articles
Finite Control Set Model Predictive Control for Complex Energy System with Large-Scale Wind Power
By: Shen, Yang-Wu; Yuan, Jin-Rong; Bai, Xiaoqing…[et al.]. Complexity. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments
By: Wang, Ping; Wang, Ding; Li, Fagen…[et al.]. Security and Communication Networks. No. 2019 (2019), pp.1-13, 13 p.
Journal Articles
Expression of Sclerostin in Osteoporotic Fracture Patients Is Associated with DNA Methylation in the CpG Island of the SOST Gene
By: Cao, Yanming; Nonnemacher, Michael R.; Xu, Liangliang…[et al.]. International Journal of Genomics. No. 2019 (2019), pp.1-8, 8 p.
Journal Articles
On the RCCA Security of Hybrid Signcryption for Internet of Things
By: Dai, Honglong; Wang, Ding; Meng, Weizhi…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Data Leakage Prevention Method Based on the Reduction of Confidential and Context Terms for Smart Mobile Devices
By: Yu, Xiang; Jiang, Feng; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
A Secure Three-Factor Multiserver Authentication Protocol against the Honest-But-Curious Servers
By: Guo, Hua; Li, Xiong; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Muscle Activity-Driven Green-Oriented Random Number Generation Mechanism to Secure WBSN Wearable Device Communications
By: Cao, Yuanlong; You, Ilsun; Samuel, Oluwarotimi Williams…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-11, 11 p.
Journal Articles
Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks
By: Wang, Chen; Ji, Sai; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-7, 7 p.
Journal Articles
A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks
By: Zhang, Ke; Xu, Kai; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
LIP-PA: A Logistics Information Privacy Protection Scheme with Position and Attribute-Based Access Control on Mobile Devices
By: Ma, Jianfeng; Yang, Chao; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-14, 14 p.
Journal Articles
Semidefinite Relaxation Algorithm for Multisource Localization Using TDOA Measurements with Range Constraints
By: Yin, Jiexin; Wang, Ding; Wang, Yunlong…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-9, 9 p.
Journal Articles
Secure Certificateless Authentication and Road Message Dissemination Protocol in VANETs
By: Choi, Dongmin; Pan, Sung Bum; Chung, Ilyong…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-13, 13 p.
Journal Articles
Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?
By: Goicoechea-Telleria, Ines; Sanchez-Reillo, Raul; Wang, Ding…[et al.]. Wireless Communications and Mobile Computing. No. 2018 (2018), pp.1-16, 16 p.
Journal Articles
A Constrained-Total-Least-Squares Method for Joint Estimation of Source and Sensor Locations: A General Framework
By: Wang, Ding; Liu, Ruirui; Ubertini, Filippo…[et al.]. Mathematical Problems in Engineering. No. 2018 (2018), pp.1-23, 23 p.
Journal Articles
An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks
By: Liu, Anfeng; Zhao, Ming; Wang, Tian…[et al.]. Security and Communication Networks. No. 2018 (2018), pp.1-30, 30 p.
Journal Articles
Privacy-Preserving Biometric Authentication: Challenges and Directions
By: Pagnin, Elena; Mitrokotsa, Aikaterini; Wang, Ding. Security and Communication Networks. No. 2017 (2017), pp.1-9, 9 p.
Journal Articles
Relieving the Impact of Transit Signal Priority on Passenger Cars through a Bilevel Model
By: Wang, Ding; Qiao, Wenxin; Park, Dongjoo…[et al.]. Journal of Advanced Transportation. No. 2017 (2017), pp.1-10, 10 p.
Journal Articles
Optical Flow SensorINSMagnetometer Integrated Navigation System for MAV in GPS-Denied Environment
By: Shen, Chong; Jun, Tang; Liu, Jun…[et al.]. Journal of Sensors. No. 2016 (2016), pp.1-10, 10 p.