-
41
Reinforcement Learning Based Stochastic Shortest Path Finding in Wireless Sensor Networks
Published 2019-01-01Subjects: Get full text
Article -
42
Proof of storage with corruption identification and recovery for dynamic group users
Published 2022-10-01Subjects: Get full text
Article -
43
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01Subjects: Get full text
Article -
44
Electronic evidence in criminal proceedings: problematic issues of theory and practice
Published 2023-10-01Subjects: Get full text
Article -
45
İSMAİL FENNİ ERTUĞRUL'UN BAZI FELSEFİ GÖRÜŞLERİ
Published 2009-07-01Subjects: Get full text
Article -
46
Proving Corruption in the Investigative and Judicial Practice of Ukraine: Problems and Solutions
Published 2021-03-01Subjects: Get full text
Article -
47
Block level cloud data deduplication scheme based on attribute encryption
Published 2023-10-01Subjects: Get full text
Article -
48
PoSW:novel secure deduplication scheme for collaborative cloud applications
Published 2017-07-01Subjects: “…proof of shared ownership…”
Get full text
Article -
49
Lightweight multi-coupon system for multi-merchant environments with DAA
Published 2016-09-01Subjects: Get full text
Article -
50
Efficient and fully simulated oblivious transfer protocol on elliptic curve
Published 2023-02-01Subjects: Get full text
Article -
51
Credible distributed identity authentication system of microgrid based on blockchain
Published 2021-12-01Subjects: Get full text
Article -
52
Collecting facts and burden of proof in administrative procedure
Published 2024-01-01Subjects: Get full text
Article -
53
Undergraduate Students’ Mathematical Proof Processes in a Calculus Course: A Case Study
Published 2007-10-01Subjects: Get full text
Article -
54
Privacy-preserving attribute-based access control using homomorphic encryption
Published 2025-01-01Subjects: “…Non-interactive zero knowledge proof…”
Get full text
Article -
55
Peculiarities of the investigation of frauds disguised as civil legal relations
Published 2023-07-01Subjects: “…peculiarities of the process of proof…”
Get full text
Article -
56
Application of specialised knowledge in proceedings concerning defence land
Published 2023-07-01Subjects: Get full text
Article -
57
Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain
Published 2022-08-01Subjects: Get full text
Article -
58
A Control-Theoretical Zero-Knowledge Proof Scheme for Networked Control Systems
Published 2024-01-01Subjects: Get full text
Article -
59
Unclonable dynamic k-times anonymous authentication
Published 2012-07-01Subjects: Get full text
Article -
60
Wireless sensor security communication and anti-leak locating technology based on region partition in power mobile inspection
Published 2016-02-01Subjects: Get full text
Article