共 50 条
[22]
A Secure Multiple-Agent Cryptographic Key Recovery System
[J].
PROCEEDINGS OF THE 2009 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION,
2008,
:91-96
[23]
Cryptographic inference for large language model via secret sharing
[J].
Tongxin Xuebao/Journal on Communications,
2025, 46 (06)
:168-184
[24]
Enhancing the Cryptographic Strength of the LSB Steganographic Method with Pixel Sieving
[J].
2019 15TH INTERNATIONAL CONFERENCE ON ENGINEERING OF MODERN ELECTRIC SYSTEMS (EMES),
2019,
:237-240
[25]
UC-secure Two-Server Password-Based Authentication Protocol and Its Applications
[J].
ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:153-164
[28]
Cryptographic key issues and solutions for the bit sieve/pixel-sieve method
[J].
2014 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION, QUALITY AND TESTING, ROBOTICS,
2014,
[29]
Performance analysis of privacy preserving distributed data mining based on cryptographic techniques
[J].
2021 7TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENERGY SYSTEMS (ICEES),
2021,
:635-640
[30]
Cheating Prevention in Visual Cryptographic Schemes using Message Embedding: A Hardware Based Practical Approach
[J].
PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT),
2014,
:319-324