-
21
-
22
Boardroom electronic voting scheme based on DC-net
Published 2012-09-01Subjects: Get full text
Article -
23
Evaluation of a user‐friendly CSDS cage apparatus for studying depressive‐like behaviors in rodents
Published 2025-01-01Subjects: Get full text
Article -
24
Automatic proof of resistance of denial of service attacks in protocols
Published 2012-03-01Subjects: Get full text
Article -
25
Trusted coalition-proof protocol model based on secure multi-part computing
Published 2011-01-01Subjects: Get full text
Article -
26
Distributed anonymous authentication scheme based on the blockchain in VANET
Published 2022-09-01Subjects: Get full text
Article -
27
-
28
Proof of theorems in school and university mathematics courses аs a method for improving the results of studies
Published 2022-05-01Subjects: Get full text
Article -
29
ANALYSIS OF NONLINEAR TRANSIENT DYNAMIC RESPONSE FOR EXPLOSION-PROOF BOX
Published 2016-01-01Subjects: “…Explosion-proof box…”
Get full text
Article -
30
-
31
Physical One‐Way Functions for Decentralized Consensus Via Proof of Physical Work
Published 2025-02-01Subjects: Get full text
Article -
32
Representation of an aggrieved legal entity that has suffered damage as a result of a criminal offence at the stage of pre-trial investigation
Published 2024-12-01Subjects: Get full text
Article -
33
Optimistic Mix-net protocol based on bilinear pairings
Published 2013-11-01Subjects: Get full text
Article -
34
Towards an Applied Semantics for K. Gödel’s Ontological Proof: A Russellian Perspective
Published 2024-10-01Subjects: Get full text
Article -
35
Political rhetoric used by the main parties in the final debate before the 1999 election
Published 2022-10-01Subjects: Get full text
Article -
36
Contester par projets. Le cas des monnaies locales associatives
Published 2015-12-01Subjects: Get full text
Article -
37
A Review of“Basics of Islamic Law Inference” Book
Published 2018-07-01Subjects: Get full text
Article -
38
APPOINTMENT OF HANDWRITING EXAMINATION: ANALYSIS OF COURT PRACTICE
Published 2022-12-01Subjects: Get full text
Article -
39
Research progress on secure data deduplication in cloud
Published 2016-11-01Subjects: Get full text
Article -
40
Secure and verifiable multi-keyword searchable encryption scheme in cloud
Published 2021-04-01Subjects: Get full text
Article