-
21
Multi-server conjunctive keyword searchable encryption scheme based on BDH problem
Published 2020-02-01Subjects: Get full text
Article -
22
-
23
-
24
-
25
-
26
Security model for ID-based key exchange
Published 2010-01-01Subjects: “…ID-based key exchange…”
Get full text
Article -
27
Temporal variation of Manning roughness coefficient in furrow irrigation and its relationship with various field parameters
Published 2024-12-01Subjects: Get full text
Article -
28
Security Mechanism for Dual Stack Network Accessing of Home Gateway
Published 2014-12-01Subjects: Get full text
Article -
29
Tag's ownership transfer protocol based on quadratic residue
Published 2018-03-01Subjects: Get full text
Article -
30
ID-based server-aided verification signature scheme with strong unforgeability
Published 2016-06-01Subjects: “…ID-based server-aided verification signature…”
Get full text
Article -
31
-
32
Unpacking digital ID systems' early policy process
Published 2025-01-01Subjects: “…Digital ID…”
Get full text
Article -
33
USE OF ISOTOPE DILUTION METHOD FOR DETERMINATION OF Ce, Sm, AND Yb ABUNDANCES IN GEOLOGICAL SAMPLES BY ICP-MS
Published 2019-08-01Subjects: Get full text
Article -
34
-
35
Intent-driven 6G radio access network
Published 2020-03-01Subjects: “…intent-driven radio access network (ID-RAN)…”
Get full text
Article -
36
Public administration risks in the migration sphere in the context of digital transformation
Published 2020-12-01Subjects: Get full text
Article -
37
Analysis and improvement of an ID-based authenticated key agreement protocol
Published 2008-01-01Subjects: “…ID-based authenticated key agreement…”
Get full text
Article -
38
Efficient ID-based certificateless signature scheme
Published 2008-01-01Subjects: “…ID-based signature…”
Get full text
Article -
39
¿Poseen capacidades de innovación las empresas farmacéuticas de América Latina? La evidencia de Argentina, Brasil, Cuba y México
Published 2009-01-01Subjects: Get full text
Article -
40