-
1
Efficient method of constructing parameters in R-ate paring
Published 2010-01-01Subjects: Get full text
Article -
2
Research of STR multicast key management protocol based on bilinear pairing in ad hoc network
Published 2008-01-01Subjects: Get full text
Article -
3
Resource allocation algorithm based on the multi-relay decoding-and-forwarding in OFDM system
Published 2016-04-01Subjects: Get full text
Article -
4
Efficient identification protocol provably secure in standard model
Published 2009-01-01Subjects: Get full text
Article -
5
Design of United Identity Authentication and Key Agreement Protocol for Hybrid Cloud
Published 2014-04-01Subjects: Get full text
Article -
6
Security analysis and improvement of a certificateless signcryption scheme
Published 2015-03-01Subjects: Get full text
Article -
7
2D DOA estimation based on matrix method and joint diagonalization technique
Published 2013-09-01Subjects: Get full text
Article -
8
Provably secure secret sharing scheme based on bilinear maps
Published 2008-01-01Subjects: Get full text
Article -
9
-
10
Constant-round fair rational secret sharing scheme
Published 2017-01-01Subjects: Get full text
Article -
11
Certificate-based cross-domain authentication scheme with anonymity
Published 2018-05-01Subjects: Get full text
Article -
12
Opportunistic spectrum sharing protocol and optimal resource allocation based on OFDM cooperation relaying
Published 2012-11-01Subjects: Get full text
Article -
13
Resource allocation scheme in two-way multi-relay OFDM system
Published 2017-09-01Subjects: Get full text
Article -
14
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01Subjects: Get full text
Article -
15
-
16
Outdoor Massive MIMO Testbed With Directional Beams: Design, Implementation, and Validation
Published 2025-01-01Subjects: Get full text
Article -
17
Secure Biometric Verification in the Presence of Malicious Adversaries
Published 2025-01-01Subjects: Get full text
Article -
18
-
19
Provably secure partially blind signature without trusted PKG
Published 2010-01-01Subjects: Get full text
Article -
20
Efficiency identity-based threshold group signature scheme
Published 2009-01-01Subjects: Get full text
Article