-
21
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01Subjects: Get full text
Article -
22
One-way hash function with chaotic dynamic parameters
Published 2008-01-01Subjects: “…hash function…”
Get full text
Article -
23
Homologous homoclinic solutions based on DPI traffic asymmetry
Published 2016-12-01Subjects: Get full text
Article -
24
New indifferentiability security proof of MDPH hash function
Published 2022-07-01Subjects: Get full text
Article -
25
Extended integer tent maps and dynamic hash function
Published 2010-01-01Subjects: “…hash function…”
Get full text
Article -
26
A secure authentication method based on hash function for RFID system
Published 2017-06-01Subjects: Get full text
Article -
27
Sketch-based data plane hardware model for software-defined measurement
Published 2017-10-01Subjects: Get full text
Article -
28
Secure resource metering and accounting with hash chain in cloud storage
Published 2013-08-01Subjects: Get full text
Article -
29
Research on optimization of indoor positioning batch ranging system based on DS-TWR algorithm
Published 2022-01-01Subjects: Get full text
Article -
30
Research and Implementation of SlAP Monitor in LTE Network
Published 2013-01-01Subjects: Get full text
Article -
31
Cryptanalysis of some chaos-based keyed hash functions
Published 2011-01-01Subjects: Get full text
Article -
32
Android malware detection method based on SimHash
Published 2017-11-01Subjects: Get full text
Article -
33
-
34
Design keyed Hash function based on couple chaotic system
Published 2006-01-01Subjects: Get full text
Article -
35
Secure password-based authentication scheme with anonymous identity without smart cards
Published 2008-01-01Subjects: Get full text
Article -
36
Redactable blockchain supporting trapdoor revocation and limited number of redactions
Published 2023-07-01Subjects: Get full text
Article -
37
Review on cross-chain technology research of blockchains
Published 2022-12-01Subjects: Get full text
Article -
38
Blockchain covert communication scheme based on the cover of normal transactions
Published 2022-08-01Subjects: Get full text
Article -
39
New chameleon Hashing of secure and privacy-preserving vehicular communications
Published 2014-11-01Subjects: Get full text
Article -
40
Inter-domain routing security mechanism for crossing autonomous system alliance
Published 2014-10-01Subjects: Get full text
Article