-
21
Inter-domain routing security mechanism for crossing autonomous system alliance
Published 2014-10-01Subjects: Get full text
Article -
22
Duplicate elimination algorithm for data streams with SKIP Bloom filter
Published 2012-02-01Subjects: Get full text
Article -
23
-
24
Novel distributed Hash table——BChord
Published 2008-01-01Subjects: “…distributed Hash table…”
Get full text
Article -
25
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01Subjects: Get full text
Article -
26
Research and Realization of Abis Interface Monitor Technology in User-Aware Intelligence Analysis System
Published 2012-09-01Subjects: Get full text
Article -
27
Research on a real-time receiving scheme of streaming data
Published 2022-04-01Subjects: Get full text
Article -
28
Design and Implementation of DHT Algorithm for NDN
Published 2014-12-01Subjects: Get full text
Article -
29
Research on stochastic matrix mapping Hash for specific flow matching
Published 2007-01-01Subjects: Get full text
Article -
30
Research and Implementation of Synthesis Modulefor Parlay X in Monitoring System Platform of Value-Added Service
Published 2014-01-01Subjects: Get full text
Article -
31
Data security for internet plus in public cloud
Published 2017-10-01Subjects: Get full text
Article -
32
Research on differential properties of Keccak-like nonlinear transform
Published 2012-09-01Subjects: Get full text
Article -
33
A ranking hashing algorithm based on listwise supervision
Published 2019-05-01Subjects: “…learning to hash…”
Get full text
Article -
34
Design and Implementation of Protocols Association Scbeme on Iu-PS Interface in TD-SCDMA Network
Published 2014-09-01Subjects: Get full text
Article -
35
-
36
Blockchain-based result-traceable searchable encryption scheme
Published 2019-09-01Subjects: Get full text
Article -
37
SLSB-forest:approximate k nearest neighbors searching on high dimensional data
Published 2017-09-01Subjects: Get full text
Article -
38
Spatiotemporal chaotic one-way Hash function construction based on coupled tent maps
Published 2007-01-01Subjects: “…Hash function…”
Get full text
Article -
39
Remote attestation scheme for cloud platform based on double-layer unbalanced hash tree
Published 2017-09-01Subjects: Get full text
Article -
40
Analysis of cross-chain technology of blockchain
Published 2020-06-01Subjects: Get full text
Article