-
4961
CDBS: blind signature scheme based on CRYSTALS-Dilithium algorithm
Published 2024-07-01“…Tongxin xuebao…”
Get full text
Article -
4962
CAR:a P2P content addressable andauto-retrievable algorithm for MANET
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
4963
Traceback analysis of abnormal access to electronic resources from the perspective of encrypted traffic
Published 2024-11-01“…Tongxin xuebao…”
Get full text
Article -
4964
-
4965
Autonomic grid architecture based on information pool protocol
Published 2008-01-01“…Tongxin xuebao…”
Get full text
Article -
4966
Spatial error concealment method based on tensor voting
Published 2011-01-01“…Tongxin xuebao…”
Get full text
Article -
4967
-
4968
Design and implementation for partition dynamically vector quantization chip
Published 2009-01-01“…Tongxin xuebao…”
Get full text
Article -
4969
Semantic representation and interval roughness analysis of IoT CapBAC rules
Published 2021-09-01“…Tongxin xuebao…”
Get full text
Article -
4970
Review of threat discovery and forensic analysis based on system provenance graph
Published 2022-07-01“…Tongxin xuebao…”
Get full text
Article -
4971
-
4972
-
4973
-
4974
-
4975
-
4976
Spectrum access scheme of MAC layer for real-time traffic in cognitive radio network
Published 2014-04-01“…Tongxin xuebao…”
Get full text
Article -
4977
Ciphertext policy hidden access control scheme based on blockchain and supporting data sharing
Published 2022-06-01“…Tongxin xuebao…”
Get full text
Article -
4978
-
4979
Research on key technology of vulnerability threat classification
Published 2012-09-01“…Tongxin xuebao…”
Get full text
Article -
4980