为了提供给您更好的使用体验,请启用此功能。';window.onload=function(){1==navigator.cookieEnabled||(document.body.insertAdjacentHTML("beforeend",ck_html),window.onscroll=function(i){console.log(i),document.body.setAttribute("style","position:fixed")})}
1. Polynomial delay hybrid algorithms to enumerate candidate keys for a relation NSTL国家科技图书文献中心
Ennaoui, Karima | Nourine, Lhouari - 《Discrete Applied Mathematics》 - 2025,360 - 443~450 - 共8页
2. SoK: Signatures with Randomizable Keys NSTL国家科技图书文献中心
Sofia Celi | Scott Griffy... - 《Financial Cryptography and Data Security,Part II》 - International Conference on Financial Cryptography and Data Security - 2025, - 160~187 - 共28页
3. A Retrospective Look at Local, State, and Federal Protected Areas in and Around the Florida Keys NSTL国家科技图书文献中心
Joel T. Heinen - 《Natural areas journal》 - 2025,45(1) - 11~19 - 共9页
4. Reminisce for Securing Private-Keys in Public NSTL国家科技图书文献中心
Shlomi Dolev | Komal Kumari... - 《Cyber Security,Cryptology,and Machine Learning》 - International Symposium on Cyber Security,Cryptography and Machine Learning - 2025, - 168~177 - 共10页
5. iVault: Architectural Code Concealing Techniques to Protect Cryptographic Keys NSTL国家科技图书文献中心
George Christou | Giorgos Vasiliadis... - 《Embedded Computer Systems: Architectures,Modeling,and Simulation,Part II》 - International Conference on Embedded Computer Systems - 2025, - 152~164 - 共13页
6. Discovering a Representative Set of Link Keys in RDF Datasets NSTL国家科技图书文献中心
Nacira Abbas | Alexandre Bazin... - 《Knowledge Engineering and Knowledge Management》 - International Conference on Knowledge Engineering and Knowledge Management - 2025, - 53~68 - 共16页
7. Misbinding Raw Public Keys to Identities in TLS NSTL国家科技图书文献中心
Mariam Moustafa | Mohit Sethi... - 《Secure IT Systems》 - Nordic Conference on Secure IT Systems - 2025, - 62~79 - 共18页
8. Iron keys from the Roman Province of Iudaea/Palaestina: a typological and technological study NSTL国家科技图书文献中心
Pagelson, Yarden | Farhi, Yoav... - 《Archaeological and anthropological sciences》 - 2025,17(5) - 共20页
9. Post-quantum secure compact deterministic wallets from isogeny-based signatures with rerandomized keys NSTL国家科技图书文献中心
Shaw, Surbhi | Dutta, Ratna - 《Theoretical computer science》 - 2025,1035 - 共29页
10. Spatiotemporal patterns in Diadema antillarum settlement in the Florida Keys: implications for habitat restoration NSTL国家科技图书文献中心
Skowronski, Julia S. | Sharp, William C.... - 《Coral reefs》 - 2025,44(3) - 911~922 - 共12页
服务站
成员单位
友情链接