共 50 条
- [32] Information Security Through Encrypted Domain Data Hiding INNOVATIVE DATA COMMUNICATION TECHNOLOGIES AND APPLICATION, 2020, 46 : 370 - 379
- [33] Privacy Amplification of Distributed Encrypted Sources with Correlated Keys 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 958 - 962
- [34] Probing Protein Sequences as Sources for Encrypted Antimicrobial Peptides PLOS ONE, 2012, 7 (09):
- [35] Security of radioactive sources NUCLEAR ENERGY-JOURNAL OF THE BRITISH NUCLEAR ENERGY SOCIETY, 2003, 42 (03): : 126 - 126
- [37] Encrypted Computing Speed, Security and Provable Obfuscation against Insiders 2017 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2017,
- [38] Amazon Echo Security: Machine Learning to Classify Encrypted Traffic 2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN), 2018,
- [39] Security Authentication System using Encrypted Channel on UAV Network 2017 FIRST IEEE INTERNATIONAL CONFERENCE ON ROBOTIC COMPUTING (IRC), 2017, : 393 - 398
- [40] Security of Verifiably Encrypted Signatures and a Construction without Random Oracles PAIRING-BASED CRYPTOGRAPHY - PAIRING 2009, 2009, 5671 : 17 - 34