Item request has been placed! ×
Item request cannot be made. ×
loading  Processing Request
Academic Journal

原子系统中偶极-偶极相互作用对量子存储支撑熵不确定度的调控研究.

  • Source: Journal of Atomic & Molecular Physics (1000-0364); 2025, Vol. 42 Issue 2, p1-6, 6p

Record details

×
Academic Journal

Automated sugarcane crop disease forecasting with colour and texture features.

Subjects: AGRICULTURAL forecasts; SUGARCANE; FEATURE extraction

  • Source: Computer Methods in Biomechanics & Biomedical Engineering: Imaging & Visualisation; Dec2024, Vol. 11 Issue 7, p1-15, 15p

Record details

×
Academic Journal

Provable secure authentication key agreement for wireless body area networks.

  • Source: Frontiers of Computer Science; Oct2024, Vol. 18 Issue 5, p1-11, 11p

Record details

×
Academic Journal

Delegable zk-SNARKs with proxies.

  • Source: Frontiers of Computer Science; Oct2024, Vol. 18 Issue 5, p1-17, 17p

Record details

×
Academic Journal

Blockchain based federated learning for intrusion detection for Internet of Things.

  • Source: Frontiers of Computer Science; Oct2024, Vol. 18 Issue 5, p1-11, 11p

Record details

×
Academic Journal

ENUMERATING WORD MAPS IN FINITE GROUPS.

Subjects: FINITE groups; OPEN-ended questions; MULTILINEAR algebra

  • Source: International Journal of Group Theory; Sep2024, Vol. 13 Issue 3, p307-318, 12p

Record details

×
Academic Journal

Generalized splitting-ring number theoretic transform.

  • Source: Frontiers of Computer Science; Aug2024, Vol. 18 Issue 4, p1-3, 3p

Record details

×
Conference

Front Matter: Volume 12973.

  • Source: Proceedings of SPIE; 7/29/2024, Vol. 12973, p1297301-1297301, 1p

Record details

×
Conference

A wide-area multi-factor identity authentication scheme based on PKI.

  • Source: Proceedings of SPIE; 7/29/2024, Vol. 12973, p129730G-129730G-10, 1p

Record details

×
Conference

High capacity secret embedding strategy for QR codes based on EMD.

  • Source: Proceedings of SPIE; 6/9/2024, Vol. 12923, p1292329-1292329, 1p

Record details

×
Conference

Design of DMA burst transmission with AES encryption function.

  • Source: Proceedings of SPIE; 6/5/2024, Vol. 12919, p129191I-129191I-6, 1p

Record details

×
Conference

Auditable anonymous authentication scheme for cross-chain data transmission.

  • Source: Proceedings of SPIE; 6/2/2024, Vol. 12916, p1291612-1291612, 1p

Record details

×
Conference

Study limitations of DoS attackers due to computer resources.

  • Source: Proceedings of SPIE; 6/2/2024, Vol. 12916, p129161U-129161U-5, 1p

Record details

×
Conference

A high-throughput DAG-based blockchain protocol.

  • Source: Proceedings of SPIE; 6/2/2024, Vol. 12916, p1291626-1291626, 1p

Record details

×
Conference

Blockchain-based ciphertext access control for data sharing.

  • Source: Proceedings of SPIE; 6/2/2024, Vol. 12916, p129162E-129162E-7, 1p

Record details

×
Academic Journal

The Art of Cybercrime Community Research.

  • Source: ACM Computing Surveys; Jun2024, Vol. 56 Issue 6, p1-26, 26p

Record details

×
Academic Journal

Towards Differential Privacy in Sequential Recommendation: A Noisy Graph Neural Network Approach.

  • Source: ACM Transactions on Knowledge Discovery from Data; Jun2024, Vol. 18 Issue 5, p1-21, 21p

Record details

×
Academic Journal

Privacy and Integrity Protection for IoT Multimodal Data Using Machine Learning and Blockchain.

Subjects: DATA privacy; MACHINE learning; DATA integrity

  • Source: ACM Transactions on Multimedia Computing, Communications & Applications; Jun2024, Vol. 20 Issue 6, p1-18, 18p

Record details

×
Academic Journal

A Bitcoin-based Secure Outsourcing Scheme for Optimization Problem in Multimedia Internet of Things.

Subjects: INTERNET of things; CONTRACTING out; DATA privacy

  • Source: ACM Transactions on Multimedia Computing, Communications & Applications; Jun2024, Vol. 20 Issue 6, p1-23, 23p

Record details

×
Academic Journal

DL4SC: a novel deep learning-based vulnerability detection framework for smart contracts.

  • Source: Automated Software Engineering; Jun2024, Vol. 31 Issue 1, p1-41, 41p

Record details

×
Academic Journal

A security framework for mobile agent systems.

  • Source: Automated Software Engineering; Jun2024, Vol. 31 Issue 1, p1-36, 36p

Record details

×
Academic Journal

Differentially private multi-agent constraint optimization.

  • Source: Autonomous Agents & Multi-Agent Systems; Jun2024, Vol. 38 Issue 1, p1-39, 39p

Record details

×
  • 1-50 of  136,911 results for ""CRYPTOGRAPHY""