共 50 条
- [41] A Secure Digital Signature Algorithm Based on Elliptic Curve and Chaotic Mappings Circuits, Systems and Signal Processing, 2005, 24 : 585 - 597
- [43] Study on the application of digital certificates in the protection of network information security and data integrity Li, H. (493885444@qq.com), 1600, Academy Publisher, P.O.Box 40,, OULU, 90571, Finland (08): : 2592 - 2598
- [44] Beyond Classical Cryptography: A Systematic Review of Post-Quantum Hash-Based Signature Schemes, Security, and Optimizations IEEE ACCESS, 2024, 12 : 175969 - 175987
- [45] CONSTRUCTION METHOD OF INFORMATION SECURITY DETECTION BASED ON CLUSTERING ALGORITHM SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (06): : 5295 - 5301
- [46] A Lightweight Digital Signature Based Security Scheme for Human-Centered Internet of Things IEEE ACCESS, 2018, 6 : 31630 - 31643
- [48] Network Information Security Model Based on Web Data Mining INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND APPLICATIONS, ICICA 2016, 2018, 632 : 51 - 56
- [49] Network Security Analysis and Design of Medical Information System Based on FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 502 - 506
- [50] The elementary introduction of network security based on logistics information platform PROCEEDINGS OF THE 2006 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2006, : 716 - 720