Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations-Based Wireless Sensor Networks
Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows
Design of Hash Function Using Two Dimensional Cellular Automata
Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture
Preventing Fault Attack on Stream Ciphers by Fault Detection and Correction
A Guests Managing System with Lattice-based Verifier-local Revocation Group Signature Scheme with Time-bound keys
Theory and Application of Computationally Independent One-Way Functions: Interactive Proof of Ability Revisited
NCASH: Non-linear Cellular Automata based Hash function
Conditions for Feedback Shift Registers to Generate Permutations
A Decision Making Framework for Green Supplier Selection Using FAHP and Taguchi Quality Loss Functions.

Browse Subjects

Show more subjects...

Statistics

from
to
Export