共 50 条
- [41] Differential privacy: Review of improving utility through cryptography-based technologies CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (05):
- [42] Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking Wireless Personal Communications, 2017, 94 : 2925 - 2936
- [43] Teaching Cryptography-based Software Developing with Open-source Software ICCSSE 2009: PROCEEDINGS OF 2009 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, 2009, : 1604 - 1608
- [44] Extending the Collaboration Boundary in Localized Threshold Cryptography-Based Schemes for MANETs 2009 IEEE 9TH MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS (MICC), 2009, : 290 - 294
- [45] Methodology and toolset for ASIP design and development targeting cryptography-based applications 2007 IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES, AND PROCESSORS, 2007, : 365 - 370
- [47] Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2012, 23 (07): : 618 - 624
- [48] Secure Cryptography Testbed Implementation for SCADA Protocols Security 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE APPLICATIONS AND TECHNOLOGIES (ACSAT), 2014, : 315 - 320
- [49] IBC-HWMP: a novel secure identity-based cryptography-based scheme for Hybrid Wireless Mesh Protocol for IEEE 802.11s CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2013, 25 (05): : 686 - 700
- [50] Elliptic Curve Cryptography-Based Identity Authentication Scheme Suitable for Metaverse Environment SYMMETRY-BASEL, 2024, 16 (07):