-
1
A secure method of voting and planning based on quadratic voting
Published 2025-02-01Subjects: Get full text
Article -
2
Secure and verifiable outsourcing of determinant computing in the cloud and its electronic trading scheme
Published 2016-11-01Subjects: Get full text
Article -
3
Efficient certificateless searchable encryption scheme with verifiability
Published 2023-08-01Subjects: Get full text
Article -
4
Secure efficient and verifiable large linear equations solve outsourcing computing scheme
Published 2017-06-01Subjects: Get full text
Article -
5
Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies
Published 2024-01-01Subjects: Get full text
Article -
6
Efficient fuzzy attribute-based signcryption scheme
Published 2013-08-01Subjects: Get full text
Article -
7
EXPLORING THE IMPACT OF ARTIFICIAL INTELLIGENCE ON FINANCIAL ACCOUNTING: OPPORTUNITIES, CHALLENGES, AND FUTURE DIRECTIONS
Published 2024-12-01Subjects: Get full text
Article -
8
Review and Critique of the Book “Logical Philosophy”
Published 2017-10-01Subjects: Get full text
Article -
9
Lattice-based verifiable timed signature and application
Published 2024-10-01Subjects: “…verifiable timed signature…”
Get full text
Article -
10
Verifiable special threshold secret sharing scheme based on eigenvalue
Published 2018-08-01Subjects: Get full text
Article -
11
Dual verifiable cloud storage scheme based on blockchain
Published 2021-12-01Subjects: Get full text
Article -
12
Practical group signature scheme with verifier-local revocation
Published 2011-01-01Subjects: Get full text
Article -
13
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Published 2024-01-01Subjects: Get full text
Article -
14
Highly efficient compact verifiable shuffle scheme based on QA-NIZK proof
Published 2015-09-01Subjects: “…compact verifiable shuffle…”
Get full text
Article -
15
CRITICAL STATE SELECTION OF THE DYNAMIC HORIZONTAL IMPACT TEST FOR A CERTAIN TYPE AIRLINE SEAT INSTALLED
Published 2016-01-01Subjects: Get full text
Article -
16
Threshold re-encryption based secure deduplication method for cloud data with resistance against side channel attack
Published 2020-06-01Subjects: Get full text
Article -
17
New certificateless aggregate signature scheme with universal designated verifier
Published 2017-11-01Subjects: “…universal designated verifier…”
Get full text
Article -
18
Verifiable federated aggregation method based on homomorphic proxy re-authentication
Published 2024-06-01Subjects: Get full text
Article -
19
Verifiable attribute-based searchable encryption scheme based on blockchain
Published 2020-02-01Subjects: Get full text
Article -
20
Research on Satellite Communication System’s Design and Verifi cation Based on SysML
Published 2021-09-01Subjects: Get full text
Article