Works matching DE "THRESHOLD signatures"
1
- Journal of Southeast University (English Edition), 2022, v. 38, n. 3, p. 213, doi. 10.3969/j.issn.1003-7985.2022.03.001
- Chen Liquan;
- Hu Jie;
- Gu Pengpeng
- Article
2
- Computer Journal, 2016, v. 59, n. 7, p. 945, doi. 10.1093/comjnl/bxv098
- LIU, JOSEPH K.;
- SZE LING YEO;
- WUN-SHE YAP;
- CHOW, SHERMAN S. M.;
- WONG, DUNCAN S.;
- SUSILO, WILLY
- Article
3
- International Journal of Electronics & Telecommunications, 2021, v. 67, n. 2, p. 201, doi. 10.24425/ijet.2021.135965
- Pomykała, Jacek;
- Kułakowski, Henryk;
- Sapiecha, Piotr;
- Grela, Błazej
- Article
4
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2016, v. 20, n. 12, p. 4907, doi. 10.1007/s00500-015-1778-2
- Wu, Zhendong;
- Liang, Bin;
- You, Lin;
- Jian, Zhihua;
- Li, Jin
- Article
5
- PLoS ONE, 2017, v. 12, n. 4, p. 1, doi. 10.1371/journal.pone.0174744
- Martincorena, Inigo;
- Darbo, Elodie;
- Sugar, Robert;
- Mifsud, Borbala;
- Luscombe, Nicholas M.;
- Schoenfelder, Stefan;
- Fraser, Peter
- Article
6
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2094, doi. 10.1002/sec.921
- Wang, Feng;
- Chang, Chin-Chen;
- Harn, Lein
- Article
7
- Security & Communication Networks, 2013, v. 6, n. 5, p. 612, doi. 10.1002/sec.593
- Lin, Jingqiang;
- Liu, Peng;
- Jing, Jiwu;
- Wang, Qiongxiao
- Article
8
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 2, p. 897, doi. 10.3837/tiis.2016.02.025
- Yan Jie;
- Lu Yu;
- Chen Li-yun;
- Nie Wei
- Article
9
- Journal of Supercomputing, 2017, v. 73, n. 6, p. 2525, doi. 10.1007/s11227-016-1944-z
- Quislant, Ricardo;
- Gutierrez, Eladio;
- Zapata, Emilio;
- Plata, Oscar
- Article
10
- Journal of Supercomputing, 2013, v. 65, n. 2, p. 496, doi. 10.1007/s11227-012-0760-3
- Chen, Bing-Chang;
- Yeh, Her-Tyan
- Article
11
- Wireless Personal Communications, 2015, v. 80, n. 3, p. 1281, doi. 10.1007/s11277-014-2087-2
- Kumar, Raman;
- Verma, Harsh;
- Dhir, Renu
- Article
12
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 11, p. 1401, doi. 10.1049/iet-com.2015.0690
- Hasani-Baferani, Mohsen;
- Abouei, Jamshid;
- Zeinalpour-Yazdi, Zolfa
- Article
13
- International Journal of Information Security, 2013, v. 12, n. 6, p. 439, doi. 10.1007/s10207-013-0200-2
- Bresson, Emmanuel;
- Catalano, Dario;
- Di Raimondo, Mario;
- Fiore, Dario;
- Gennaro, Rosario
- Article
14
- Intelligent Automation & Soft Computing, 2012, v. 18, n. 6, p. 739, doi. 10.1080/10798587.2012.10643284
- XIN LV;
- ZHIJIAN WANG;
- FENG QIAN;
- FENG XU
- Article
15
- Journal of Information Science & Engineering, 2012, v. 28, n. 3, p. 571
- Jia Yu;
- Fan-Yu Kong;
- Hua-Wei Zhao;
- Xiang-Guo Cheng;
- Rong Hao;
- Xiang-Fa Guo
- Article