Font Size: a A A
Keyword [Adversary]
Result: 1 - 20 | Page: 1 of 3
1. Researches On Theories And Key Technologies Of Information Security Operation In Network Environment
2. Research And Development Of Strategy And Simulation System Of Robot Soccer
3. Theory And Methods Of Intrusion Tolerance: Research And Applications
4. Key Technologies Of Multi-robot Coordination And Cooperation In Adversarial Environment
5. Research On Some Multi-Party Signature Schemes
6. On The Security Of Multi-Party Computation And Secret Sharing
7. Random Key Pre-Distribution Scheme Based On Secure Connectivity Detection In Wireless Sensor Networks
8. RSA Verifiable Signature Sharing Scheme Made Simple
9. Research On Virtualization Intrusion Tolerance Based On Cloud Computing
10. Physical Protection Of System Analysis Software Design And Development
11. Mobile Ad Hoc Networks Against Mobile Adversary Program
12. Several Practical Multi-secret Sharing Scheme
13. Two Types Of Secret Sharing Scheme
14. Analysis And Design Of Certificateless Signcryption Schemes
15. Research On Provably Security Model For AKE Protocol
16. Research On Adversary-aware Pattern Classification And Their Applications
17. Security Analysis Of SPINS Protocol Based On CK Model
18. Research On Source Location Privacy Preservation In Wireless Sensor Networks
19. Research On Applications And Protocols Of Secure Multi-party Computation
20. Inside Keyword Guessing Attack Resistant Public Key Encryption With Keyword Search
  <<First  <Prev  Next>  Last>>  Jump to