共 50 条
- [23] An Improved Method for Database Encryption Based on the Chinese Remainder Theorem ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2008, : 588 - 590
- [24] Chinese Remainder Theorem Based DTN Group Key Management PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 779 - 783
- [25] A Threshold Secret Sharing Scheme Based on LMCA and Chinese Remainder Theorem PROCEEDINGS OF 2016 9TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2016, : 439 - 442
- [26] BPCRT: Bivariate Polynomial and Chinese Remainder Theorem Based Group Key Management Scheme for Sensor Networks 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 414 - 417
- [27] A Reversible Sketch Based on Chinese Remainder Theorem: Scheme and Performance Study INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 59 - 65
- [28] A Threshold Encryption Scheme without a Dealer Based on Chinese Remainder Theorem 2017 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2017, : 90 - 96
- [29] Lattice-Based Secret Sharing Scheme (Chinese Remainder Theorem) DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 54 - 62