Linked e-resources
Details
Table of Contents
On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations-Based Wireless Sensor Networks
Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows
Design of Hash Function Using Two Dimensional Cellular Automata
Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture
Preventing Fault Attack on Stream Ciphers by Fault Detection and Correction
A Guests Managing System with Lattice-based Verifier-local Revocation Group Signature Scheme with Time-bound keys
Theory and Application of Computationally Independent One-Way Functions: Interactive Proof of Ability Revisited
NCASH: Non-linear Cellular Automata based Hash function
Conditions for Feedback Shift Registers to Generate Permutations
A Decision Making Framework for Green Supplier Selection Using FAHP and Taguchi Quality Loss Functions.
Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows
Design of Hash Function Using Two Dimensional Cellular Automata
Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture
Preventing Fault Attack on Stream Ciphers by Fault Detection and Correction
A Guests Managing System with Lattice-based Verifier-local Revocation Group Signature Scheme with Time-bound keys
Theory and Application of Computationally Independent One-Way Functions: Interactive Proof of Ability Revisited
NCASH: Non-linear Cellular Automata based Hash function
Conditions for Feedback Shift Registers to Generate Permutations
A Decision Making Framework for Green Supplier Selection Using FAHP and Taguchi Quality Loss Functions.