为了提供给您更好的使用体验,请启用此功能。';window.onload=function(){1==navigator.cookieEnabled||(document.body.insertAdjacentHTML("beforeend",ck_html),window.onscroll=function(i){console.log(i),document.body.setAttribute("style","position:fixed")})}
1. Polynomial delay hybrid algorithms to enumerate candidate keys for a relation NSTL国家科技图书文献中心
Ennaoui, Karima | Nourine, Lhouari - 《Discrete Applied Mathematics》 - 2025,360 - 443~450 - 共8页
2. SoK: Signatures with Randomizable Keys NSTL国家科技图书文献中心
Sofia Celi | Scott Griffy... - 《Financial Cryptography and Data Security,Part II》 - International Conference on Financial Cryptography and Data Security - 2025, - 160~187 - 共28页
3. A Retrospective Look at Local, State, and Federal Protected Areas in and Around the Florida Keys NSTL国家科技图书文献中心
Joel T. Heinen - 《Natural areas journal》 - 2025,45(1) - 11~19 - 共9页
4. Reminisce for Securing Private-Keys in Public NSTL国家科技图书文献中心
Shlomi Dolev | Komal Kumari... - 《Cyber Security,Cryptology,and Machine Learning》 - International Symposium on Cyber Security,Cryptography and Machine Learning - 2025, - 168~177 - 共10页
5. iVault: Architectural Code Concealing Techniques to Protect Cryptographic Keys NSTL国家科技图书文献中心
George Christou | Giorgos Vasiliadis... - 《Embedded Computer Systems: Architectures,Modeling,and Simulation,Part II》 - International Conference on Embedded Computer Systems - 2025, - 152~164 - 共13页
6. Discovering a Representative Set of Link Keys in RDF Datasets NSTL国家科技图书文献中心
Nacira Abbas | Alexandre Bazin... - 《Knowledge Engineering and Knowledge Management》 - International Conference on Knowledge Engineering and Knowledge Management - 2025, - 53~68 - 共16页
7. Misbinding Raw Public Keys to Identities in TLS NSTL国家科技图书文献中心
Mariam Moustafa | Mohit Sethi... - 《Secure IT Systems》 - Nordic Conference on Secure IT Systems - 2025, - 62~79 - 共18页
8. Post-quantum secure compact deterministic wallets from isogeny-based signatures with rerandomized keys NSTL国家科技图书文献中心
Shaw, Surbhi | Dutta, Ratna - 《Theoretical computer science》 - 2025,1035 - 共29页
9. Antireflux surgeries and hiatal repair: keys to success NSTL国家科技图书文献中心
Watson, Abigail Clai... | Watson, David Ian - 《Expert review of gastroenterology & hepatology》 - 2025,19(2) - 181~195 - 共15页
10. Distributing Keys and Random Secrets with Constant Complexity NSTL国家科技图书文献中心
Benny Applebaum | Benny Pinkas - 《Theory of Cryptography,Part IV》 - Theory of Cryptography Conference - 2025, - 485~516 - 共32页
服务站
成员单位
友情链接