-
1
Efficient top-k string similarity query algorithms
Published 2014-12-01Subjects: Get full text
Article -
2
RSA-based image recognizable adversarial attack method
Published 2021-10-01Subjects: Get full text
Article -
3
Certificateless signature scheme without bilinear pairings
Published 2012-04-01Subjects: “…certificateless signature scheme…”
Get full text
Article -
4
Research on HTML5 application cache poison attack
Published 2016-10-01Subjects: Get full text
Article