Font Size: a A A
Keyword [Identity-based cryptography]
Result: 81 - 98 | Page: 5 of 5
81. Research On Efficient Lattice-based Ring Signature Schemes
82. Research And Implementation Of SM9 Identity-based Cryptography Based On SOC
83. Research On Identity-based Cloud Storage Data Integrity Audit
84. Issues and solutions of applying identity-based cryptography to mobile ad-hoc networks
85. Research On The Methods Of Identity-Based Provable Data Possession For Cloud Storages
86. Research On Provably Secure Identity-based Public Key Cryptography Scheme Under Key Compromise Attack
87. Method And Application Research On Identity Authentication And Access Control Based On Blockchain
88. Research On Lattice-based Incremental Signature Schemes
89. Study On Provable Data Possession Scheme
90. Design And Simulation Implementation Of Identity Authentication Scheme For Space-ground Integrated Network Based On IPv6
91. Research On Data Integrity Auditing Schemes For Cloud Storage
92. Research And Application On Anonymous Authenticated Encryption Technology
93. Research On Key Issues Of Internet Trusted Authentication
94. Research And Design On Identity-Based Linkable Ring Signature On Lattice
95. Design And Implementation Of Low-latency Network Security Transmission Protocol Based On Identity-based Cryptography
96. Research On Multi-signature And Application Based On Subgroup
97. Research On Searchable Encryption Based On The SM9 Algorithm
98. IP Design And Implementation Of SM9 Algorithm Prime Domain For IoT Security Chi
  <<First  <Prev  Next>  Last>>  Jump to