Font Size: a A A
Keyword [Verified]
Result: 1 - 20 | Page: 1 of 2
1. A Study And Design Of Threshold Proxy Signature
2. Research On Some Proxy Signatures For Special Use
3. The Identity Authentication & Digital Signature Applyed In One Bank Security Information System
4. The Research Of Group Key Management In Ad Hoc Networks
5. Verified Code Recognition Algorithm Based On SVM
6. Skills Identification Verified Management System Design And Implementation
7. Employee Assistance Program (EAP) System Research And Realization
8. Researchand Implement On Technology Of Public Opinion Guidance Of Online Community
9. Computing Verified Real Roots For Polynomial Systems And Its Implementation
10. Research On The Improvement And Application Of Verified Computation Protocol
11. A Content Analysis On Shanghai Journalists’ Microblogs On Sina
12. Machine-checked Verified _mJava Compiler Targeting Micro-Dalvik Virtual Machine
13. Dynamic Symmetric Key Mobile Commerce Scheme Based On Self Authentication Mechanism
14. Achieving Verifiable Assured Deletion For Cloud Data
15. Designed And Verified Image Data Acquisition Device Based On Camera Link Protocol
16. The Verification Of Algebraic Interpolation On Experiment Point Set
17. Biometric-Based Searchable Encryption Scheme
18. A Formally Verified Clock Checker For The Synchronous Data-flow Language Lustre*
19. Specification and formal verification of fuzzy information processing for the case of edge detection
20. Preserving privacy with user-controlled sharing of verified information
  <<First  <Prev  Next>  Last>>  Jump to