为了提供给您更好的使用体验,请启用此功能。';window.onload=function(){1==navigator.cookieEnabled||(document.body.insertAdjacentHTML("beforeend",ck_html),window.onscroll=function(i){console.log(i),document.body.setAttribute("style","position:fixed")})}
1. Efficient Zero-Knowledge Argument for Bilinear Matrix Relation over the Residue Ring NSTL国家科技图书文献中心
Yuan Tian | Yongda Pang - 《Data Security and Privacy Protection,Part I》 - International Conference on Data Security and Privacy Protection - 2025, - 87~105 - 共19页
2. Blockchain-Driven Searchable Privacy Preserving Data Sharing for Manufacturing Collaboration NSTL国家科技图书文献中心
Zi Jiao | Fucai Zhou... - 《Data Security and Privacy Protection,Part I》 - International Conference on Data Security and Privacy Protection - 2025, - 3~21 - 共19页
3. Cross-Chain Asset Trading Scheme Without Trusted Third-Party NSTL国家科技图书文献中心
Bo Li | Yuling Chen... - 《Data Security and Privacy Protection,Part I》 - International Conference on Data Security and Privacy Protection - 2025, - 39~51 - 共13页
4. SSINsAuth: Fast Batch Handover Authentication Protocol in Space-Sea Integrated Networks NSTL国家科技图书文献中心
Jingwei Song | Xuru Li... - 《Data Security and Privacy Protection,Part I》 - International Conference on Data Security and Privacy Protection - 2025, - 141~159 - 共19页
5. In-Context Learning with Differentially Private Text Sanitization in Large Language Models NSTL国家科技图书文献中心
Jiluan Fan | Pei-Gen Ye... - 《Data Security and Privacy Protection,Part I》 - International Conference on Data Security and Privacy Protection - 2025, - 294~303 - 共10页
6. Social Media User Geolocation Based on Large Language Models NSTL国家科技图书文献中心
Meng Zhang | Xiangyang Luo... - 《Data Security and Privacy Protection,Part I》 - International Conference on Data Security and Privacy Protection - 2025, - 304~312 - 共9页
7. Secure Key Exchange via Transparent Reverse Firewalls NSTL国家科技图书文献中心
Jiahao Liu | Jinshu Su... - 《Data Security and Privacy Protection,Part I》 - International Conference on Data Security and Privacy Protection - 2025, - 160~177 - 共18页
8. Securing Networks: A Deep Learning Approach with Explainable AI (XAI) and Federated Learning for Intrusion Detection NSTL国家科技图书文献中心
Kazi Fatema | Mehrin Anannya... - 《Data Security and Privacy Protection,Part I》 - International Conference on Data Security and Privacy Protection - 2025, - 260~275 - 共16页
9. An Efficient Threshold Ring Signature from G+G Identification Protocol NSTL国家科技图书文献中心
Chunhui Wu | Siwei Jiang... - 《Data Security and Privacy Protection,Part I》 - International Conference on Data Security and Privacy Protection - 2025, - 211~221 - 共11页
10. UltraCommander: Ultrasonic Side Channel Attack via Browser Extensions NSTL国家科技图书文献中心
Yingli Duan | Weizhi Meng... - 《Data Security and Privacy Protection,Part I》 - International Conference on Data Security and Privacy Protection - 2025, - 195~210 - 共16页
服务站
成员单位
友情链接