-
1
Collusion-free public-key traitor tracing scheme
Published 2006-01-01Subjects: Get full text
Article -
2
Video watermarking algorithm for resisting collusion attacks
Published 2010-01-01Subjects: Get full text
Article -
3
Video steganalysis scheme based on inter-frame collusion
Published 2009-01-01Subjects: Get full text
Article -
4
Collusion-resistant cross-chain transaction scheme based on game theory and verifiable consensus
Published 2024-11-01Subjects: Get full text
Article -
5
Towards Privacy in Decentralized IoT: A Blockchain-Based Dual Response DP Mechanism
Published 2024-09-01Subjects: Get full text
Article -
6
Collusion node detection method based on fuzzy evaluation density clustering in Internet of vehicles
Published 2023-07-01Subjects: Get full text
Article -
7
Method for detecting collusion attack node in road condition information sharing based on reputation point
Published 2021-04-01Subjects: Get full text
Article -
8
CAUSES OF COLLUSION AMONG PEOPLE IN CONSTRUCTION
Published 2017-12-01Subjects: “…collusion, construction industry, corruption, project performance, project stakeholders, unethical practice…”
Get full text
Article -
9
Cooperation-based location authentication scheme for crowdsensing applications
Published 2022-09-01Subjects: Get full text
Article -
10
Spectrum sharing schemes in cognitive radio networks based on collusion formation
Published 2014-03-01Subjects: Get full text
Article -
11
Privacy protection system based on Hook for Android
Published 2018-04-01Subjects: Get full text
Article -
12
-
13
Attribute-based encryption scheme supporting attribute revocation in cloud storage environment
Published 2019-05-01Subjects: Get full text
Article -
14
Detecting and preventing collusion attack in DPoS based on power index
Published 2022-12-01Subjects: Get full text
Article -
15
EBS-based efficient and secure group key management in wireless sensor networks
Published 2009-01-01Subjects: Get full text
Article -
16
ID-based server-aided verification signature scheme with strong unforgeability
Published 2016-06-01Subjects: Get full text
Article -
17
-
18
Adaptively secure attribute-based encryption for traitor tracing
Published 2016-01-01Subjects: Get full text
Article -
19
Study on the Dynamic Evolution of Transverse Collusive Bidding Behavior and Regulation Countermeasures Under the “Machine-Managed Bidding” System
Published 2025-01-01Subjects: Get full text
Article