Passive scheme for ID end correction

被引:0
|
作者
机构
来源
Rev Sci Instrum | / 2 pt 2卷 / 1943期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] ID-based wireless authentication scheme with anonymity
    Zhu, Hui
    Li, Hui
    Su, Wan-Li
    Wang, Yu-Min
    Tongxin Xuebao/Journal on Communication, 2009, 30 (04): : 130 - 136
  • [32] SAMS: A novel ID-locator separation scheme
    Yang, Yuan
    Xu, Ming-Wei
    Yang, Jia-Hai
    Dong, Qing-Zhou
    Chen, Wen-Long
    Wang, Hui
    Zhang, Zhi-Chao
    Jisuanji Xuebao/Chinese Journal of Computers, 2014, 37 (02): : 394 - 406
  • [33] Dispersion characteristics of ID photonic crystals with passive and active layers
    Kozina, ON
    Melnikov, LA
    SARATOV FALL MEETING 2001: LASER PHYSICS AND PHOTONICS SPECTROSCOPY, AND MOLECULAR MODELING II, 2002, 4706 : 77 - 81
  • [34] Novel ID-Based Group Signature Scheme
    Zhang, Jianhong
    Geng, Qin
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12634 - 12637
  • [35] An adaptive distributed ID assignment scheme for CSMA/IC
    You, TT
    Yeh, CH
    Hassanein, H
    LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 634 - 641
  • [36] Comment on an ID-based Broadcast Signcryption Scheme
    Zhang, Jianhong
    Geng, Qin
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 37 - 40
  • [37] ID-based proxy blind signature scheme
    School of Mathematics and Computer Science, Nanjing Normal University, Nanjing 210097, China
    不详
    Jisuanji Gongcheng, 2006, 17 (203-204+224):
  • [38] A Proactive Scheme for Securing ID/Locator Split Architecture
    Li, Ruidong
    Kafle, Ved P.
    Harai, Hiroaki
    2012 20TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP), 2012,
  • [39] Dynamic ID authentication scheme using chaotic map
    Lin, Han-Yu
    WIRELESS NETWORKS, 2018, 24 (03) : 769 - 776
  • [40] A Bucket ID Transformation scheme for efficient database encryption
    Lee, Dong Hyeok
    Lee, Seung Min
    Nam, Taek Yong
    Song, You Jin
    2008 THE INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, 2008, : 93 - +