Found: 30
Select item for more details and to access through your institution.
基于字典分级和属性加权的密文排序检索方案.
- Published in:
- Journal of Xinjiang University (Natural Science Edition), 2024, v. 41, n. 2, p. 246, doi. 10.13568/j.cnki.651094.651316.2023.02.11.0002
- By:
- Publication type:
- Article
A new trapdoor spider of Cyclocosmia Ausserer, 1871 from southern China (Araneae, Halonoproctidae).
- Published in:
- Biodiversity Data Journal, 2023, p. 1, doi. 10.3897/BDJ.11.e98311
- By:
- Publication type:
- Article
A new species of trapdoor spider genus Heligmomerus Simon, 1892 (Araneae: Mygalomorphae: Idiopidae) from West Bengal, India.
- Published in:
- Serket, 2022, v. 18, n. 4, p. 441
- By:
- Publication type:
- Article
Gas Leakage From Shallow Ponding Magma and Trapdoor Faulting at Sierra Negra Volcano (Isabela Island, Galápagos).
- Published in:
- Geochemistry, Geophysics, Geosystems: G3, 2022, v. 23, n. 2, p. 1, doi. 10.1029/2021GC010288
- By:
- Publication type:
- Article
Stability of active trapdoors in axisymmetry.
- Published in:
- Underground Space (2096-2754), 2022, v. 7, n. 1, p. 50, doi. 10.1016/j.undsp.2021.05.001
- By:
- Publication type:
- Article
Lattice‐based hash‐and‐sign signatures using approximate trapdoor, revisited.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 1, p. 41, doi. 10.1049/ise2.12039
- By:
- Publication type:
- Article
"NOTHING TOUCHES ME": NOTES ON KILLING FLOOR.
- Published in:
- West Branch, 2021, n. 97, p. 131
- By:
- Publication type:
- Article
Undrained Stability Analysis of Three -Dimensional Rectangular Trapdoor in Clay.
- Published in:
- Journal of Donghua University (English Edition), 2020, v. 37, n. 4, p. 334
- By:
- Publication type:
- Article
Improving the proof of “Privacy-preserving attribute-keyword based data publish-subscribe service on cloud platforms”.
- Published in:
- PLoS ONE, 2019, v. 14, n. 2, p. 1, doi. 10.1371/journal.pone.0212761
- By:
- Publication type:
- Article
TRAPDOORS.
- Published in:
- Greensboro Review, 2018, n. 104, p. 1
- By:
- Publication type:
- Article
A NOTE ON SOME ALGEBRAIC TRAPDOORS FOR BLOCK CIPHERS.
- Published in:
- Advances in Mathematics of Communications, 2018, v. 12, n. 3, p. 515, doi. 10.3934/amc.2018030
- By:
- Publication type:
- Article
Authorized Equi-join for Multiple Data Contributors in the PKC-Based Setting.
- Published in:
- Computer Journal, 2017, v. 60, n. 12, p. 1822, doi. 10.1093/comjnl/bxx061
- By:
- Publication type:
- Article
Species conservation profile of the rare and endemic trapdoor spider Calathotarsus simoni (Araneae, Migidae) from Central Argentina.
- Published in:
- Biodiversity Data Journal, 2017, p. 1, doi. 10.3897/BDJ.5.e14790
- By:
- Publication type:
- Article
Incarceration of the inferior oblique muscle branch of the oculomotor nerve in patients with orbital floor trapdoor fracture.
- Published in:
- Graefe's Archive of Clinical & Experimental Ophthalmology, 2017, v. 255, n. 10, p. 2059, doi. 10.1007/s00417-017-3790-y
- By:
- Publication type:
- Article
Reproducible Circularly Secure Bit Encryption: Applications and Realizations.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 4, p. 1187, doi. 10.1007/s00145-016-9246-4
- By:
- Publication type:
- Article
A secure routing scheme for underwater acoustic networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2017, v. 13, n. 6, p. 1, doi. 10.1177/1550147717713643
- By:
- Publication type:
- Article
Experimental study of the progressive collapse mechanism of excavations retained by cantilever piles.
- Published in:
- Canadian Geotechnical Journal, 2017, v. 54, n. 4, p. 574, doi. 10.1139/cgj-2016-0284
- By:
- Publication type:
- Article
Efficient Cryptosystems From $$\mathbf{2}^{{\varvec{k}}}$$ -th Power Residue Symbols.
- Published in:
- Journal of Cryptology, 2017, v. 30, n. 2, p. 519, doi. 10.1007/s00145-016-9229-5
- By:
- Publication type:
- Article
Dynamic Duos? Jamaican Fruit Bats (Artibeus jamaicensis) Do Not Show Prosocial Behavior in a Release Paradigm.
- Published in:
- Axioms (2075-1680), 2016, v. 5, n. 4, p. 25, doi. 10.3390/bs6040025
- By:
- Publication type:
- Article
Privacy-Aware Relevant Data Access with Semantically Enriched Search Queries for Untrusted Cloud Storage Services.
- Published in:
- PLoS ONE, 2016, v. 11, n. 8, p. 1, doi. 10.1371/journal.pone.0161440
- By:
- Publication type:
- Article
Multi-Key Searchable Encryption with Designated Server.
- Published in:
- Intelligent Automation & Soft Computing, 2016, v. 22, n. 2, p. 295, doi. 10.1080/10798587.2015.1095476
- By:
- Publication type:
- Article
The importance of trapdoor functions.
- Published in:
- EE: Evaluation Engineering, 2015, v. 54, n. 1, p. 24
- By:
- Publication type:
- Article
Pre-ballooning in Ummidia Thorell 1875 (Araneae: Ctenizidae) from the Interior Highlands, USA: second account from the region and review of mygalomorph ballooning.
- Published in:
- Journal of Arachnology, 2014, v. 42, n. 3, p. 318, doi. 10.1636/B14-43.1
- By:
- Publication type:
- Article
Engaeus Erichson (Decapoda: Parastacidae) capture using two versions of a Norrocky trap.
- Published in:
- Australian Zoologist, 2014, v. 37, n. 2, p. 188, doi. 10.7882/AZ.2014.010
- By:
- Publication type:
- Article
Efficient identity-based signature scheme from lattices.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 3, p. 825, doi. 10.3969/j.issn.1001-3695.2014.03.045
- By:
- Publication type:
- Article
Efficient public key encryption with revocable keyword search.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 466, doi. 10.1002/sec.790
- By:
- Publication type:
- Article
Preimage Selective Trapdoor Function: How to Repair an Easy Problem.
- Published in:
- Mathematical Problems in Engineering, 2014, p. 1, doi. 10.1155/2014/475678
- By:
- Publication type:
- Article
A Fuzzy Identity-Based Signature Scheme from Lattices in the Standard Model.
- Published in:
- Mathematical Problems in Engineering, 2014, p. 1, doi. 10.1155/2014/391276
- By:
- Publication type:
- Article
Efficient three-party encrypted key exchange using trapdoor functions.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 11, p. 1353, doi. 10.1002/sec.717
- By:
- Publication type:
- Article
Key exposure free chameleon hash schemes based on discrete logarithm problem.
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 7, p. 812, doi. 10.1002/sec.612
- By:
- Publication type:
- Article