-
41
Internet cross-domain end-to-end quality monitoring and trouble location scheme
Published 2018-08-01Subjects: Get full text
Article -
42
Chaos-based encryption and message authentication algorithm for wireless sensor network
Published 2013-05-01Subjects: Get full text
Article -
43
EFH:an online unsupervised hash learning algorithm
Published 2020-03-01Subjects: Get full text
Article -
44
OpenFlow table lookup scheme integrating multiple-cell Hash table with TCAM
Published 2016-10-01Subjects: Get full text
Article -
45
Address overloading-based packet forwarding verification in SDN
Published 2022-03-01Subjects: Get full text
Article -
46
-
47
Self-healing group key distribution scheme with revocation based on dual directional hash chain
Published 2009-01-01Subjects: Get full text
Article -
48
SSDHT:social network-based secure DHT mechanism
Published 2018-11-01Subjects: Get full text
Article -
49
Self-healing key distribution scheme of MANET based on sliding window
Published 2009-01-01Subjects: Get full text
Article -
50
Distributed storage causal consistency model with trusted constraint
Published 2021-06-01Subjects: Get full text
Article -
51
Multi-parties key agreement protocol based on elliptic curve
Published 2016-05-01Subjects: Get full text
Article -
52
New hash function based on C-MD structure and chaotic neural network
Published 2023-06-01Subjects: “…hash function…”
Get full text
Article -
53
Related-key rectangle attack on the full ARIRANG encryption mode
Published 2011-01-01Subjects: Get full text
Article -
54
Novel self-renewal hash chain scheme based on (t,n) threshold and division tree
Published 2013-04-01Subjects: Get full text
Article -
55
Nearest neighbor search algorithm for high dimensional data based on weighted self-taught hashing
Published 2017-06-01Subjects: Get full text
Article -
56
Cloud data assured deletion scheme based on overwrite verification
Published 2019-01-01Subjects: Get full text
Article -
57
Preimage and pseudo-collision attacks on 29-step SM3 hash function with padding
Published 2014-02-01Subjects: “…hash function…”
Get full text
Article -
58
Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
Published 2013-06-01Subjects: “…DHA-256 hash function…”
Get full text
Article -
59
Key storage management scheme based on keyed hash tree with state
Published 2018-05-01Subjects: Get full text
Article -
60
Anonymous security authentication scheme using elliptic curve cryptography and hash function in mobile network
Published 2016-05-01Subjects: Get full text
Article