共 50 条
- [42] Public key cryptography with matrices PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 146 - 152
- [43] Certificateless public key cryptography ADVANCES IN CRYPTOLOGY - ASIACRYPT 2003, 2003, 2894 : 452 - 473
- [45] Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks NETWORK AND PARALLEL COMPUTING, 2008, 5245 : 116 - 126
- [46] Activation of LoRaWAN End Devices by Using Public Key Cryptography 2020 FOURTH CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2020,
- [47] Using Semidirect Product of (Semi) groups in Public Key Cryptography PURSUIT OF THE UNIVERSAL, 2016, 9709 : 132 - 141
- [48] Secure Checkpointing using Public Key Cryptography in Mobile Computing 2011 IEEE 5TH INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATION SYSTEMS (ANTS), 2011,
- [50] Public Key Cryptography using Neural Networks and Genetic Algorithms 2013 SIXTH INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING (IC3), 2013, : 137 - 142