secure相关论文
Recent development of the peer-to-peer(P2P)live streaming technique has brought unprecedented new momentum to the Intern......
Based on public key, a quantum identity authenticated (QIA) system is proposed without quantum entanglement. The public ......
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure i......
New Yorkers often say that it is easier to get their kids into Harvard University than into a top-tier private preschool......
The traditional Internet is oriented towards person-to-person connection, whereas the Internet of Things is oriented tow......
工作累了,想下载几首MP3听听,折腾半天也不成。改用QQ音乐在线听,结果还是“无声”而返。真奇怪啊。辗转打听,才知道是单位的网管......
阜阳市局 £4a 局长——_MINtkMMtgj’#lnH$B——q.M——D收束志不他只邀狲位J则【科校为先导推动地租工作.B为广为戳民U用凶盼引眯B.......
Does New Book on Beauty Go Only Skin-Deep Into the Issue?...
Electronic transaction through e-payment protocol will grow tremendous in the coming years. In this article, by converse......
The 21st century is the age of information when information becomes an important strategic resource. The information obt......
We propose a novel technique to increase the confidentiality of an optical code division multiple access(OCDMA) system.A......
In the field of multi-party computation,an important problem is how to construct an efficient and secure multi-party com......
In this paper,we propose a method to construct an online/offline batch verification signature scheme in a multi-signer s......
Ustaoglu presents a secure and efficient key exchange protocol named CMQV,based on the design rationales of HMQV and NAX......
In this review article,we will review the recent process of quantum communications.In the past decades,there are many de......
A project named “A New Generation of Energy Management with Three Dimensional Coordination” has recently passed techni......
2011年11月4日,流量可视性网络解决方案提供商Gigamon在纽约贾维茨会议中心召开的2011年纽约Interop大会上,宣布推出G-SECURE-0216......

