-
1
Design and implementation of proxy-protected proxy signature based on SM2
Published 2017-09-01Subjects: Get full text
Article -
2
An Algorithm of (n, t)-Threshold Proxy Signature with an Arbitrator
Published 2013-08-01Subjects: “…proxy signature…”
Get full text
Article -
3
Privacy matching-based service proxy discovery scheme
Published 2016-08-01Subjects: “…proxy;service proxy discovery;privacy matching;homomorphic encryption…”
Get full text
Article -
4
Method of Anti-Virus Protection Based on (n, t) Threshold Proxy Signature with an Arbitrator
Published 2014-04-01Subjects: Get full text
Article -
5
Evaluation of Computationally Efficient Identity-Based Proxy Signatures
Published 2025-01-01Subjects: Get full text
Article -
6
-
7
-
8
The use of nitrogen isotopic fractionation as a biomarker for feed conversion efficiency in pigs using blood and hair samples
Published 2025-12-01Subjects: Get full text
Article -
9
Conditional GAN-Based Two-Stage ISP Tuning Method: A Reconstruction–Enhancement Proxy Framework
Published 2025-03-01Subjects: Get full text
Article -
10
Secure deduplication and integrity audit system based on convergent encryption for cloud storage
Published 2017-11-01Subjects: Get full text
Article -
11
Knowledge and management of Münchausen’s Syndrome by proxy: a survey conducted through the compilation of a questionnaire by pediatricians belonging to the Italian Society of Pedia...
Published 2025-02-01Subjects: “…Münchausen Syndrome by proxy…”
Get full text
Article -
12
Corals Ba/Ca records uncover mid-twentieth century onset of land use change associated with industrial deforestation in Malaysian Borneo
Published 2025-07-01Subjects: Get full text
Article -
13
Aplicación de la metodología scrum-programación extrema al sistema para el control de trazas de un servidor proxy
Published 2021-10-01Subjects: “…control; metodología; proxy; scrum-extreme programming; trazas…”
Get full text
Article -
14
Aplicación de la metodología scrum-programación extrema al sistema para el control de trazas de un servidor proxy
Published 2021-10-01Subjects: “…control; metodología; proxy; SCRUM-Extreme Programming; trazas…”
Get full text
Article -
15
WEWENANG DAN TANGGUNG JAWAB KUASA PENGGUNA ANGGARAN DALAM PELAKSANAAN ANGGARAN BELANJA NEGARA
Published 2019-12-01Subjects: Get full text
Article -
16
Hive: A secure, scalable framework for distributed Ollama inference
Published 2025-05-01Subjects: Get full text
Article -
17
Marriage by Proxy: A Remedy to Divorce and Single Parenting as Presented in Ifá Ogbèdí Divination Poetry
Published 2023-05-01Subjects: “…Yorùbá, Single Parenting, Marriage by Proxy, Divorce, Nigeria…”
Get full text
Article -
18
Provably secure and efficient proxy signature scheme
Published 2014-08-01Subjects: Get full text
Article -
19
Provably secure and efficient proxy signature scheme
Published 2014-08-01Subjects: “…without trapdoor;small norm;proxy signature;bonsai tree…”
Get full text
Article -
20
Long Term Global Ionospheric Total Electron Content Trend Analysis
Published 2024-11-01Subjects: Get full text
Article