共 50 条
- [21] Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems E-INFRASTRUCTURE AND E-SERVICES FOR DEVELOPING COUNTRIES (AFRICOMM 2016), 2018, 208 : 281 - 291
- [22] A Mobile Terminal Authentication Scheme Based on Symmetric Cryptographic Mechanisms PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013), 2014, 255 : 131 - 137
- [23] Management of Symmetric Cryptographic Keys in Cloud Based Environment 2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 39 - 44
- [24] Research on Large-scale Authentication Architecture and Key Management Protocol Based on Combined Symmetric Key 2009 INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2009), VOLUMES 1 AND 2, 2009, : 367 - 370
- [25] Secure cloud storage based on cryptographic techniques Zhao, W. (zhaow@itsec.gov.cn), 1600, Beijing University of Posts and Telecommunications (19):
- [26] SYMMETRIC KEY CRYPTOGRAPHIC ALGORITHM BASED ON LOGARITHMIC FUNCTION 2015 FIFTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT2015), 2015, : 757 - 762
- [27] Research on Real-Name Identity Authentication Architecture Based on Combined Symmetric Key PROCEEDINGS OF 2009 CONFERENCE ON COMMUNICATION FACULTY, 2009, : 276 - 280
- [28] Research on large-scale identity authentication architecture based on combined symmetric key Tongxin Xuebao/Journal on Communications, 2009, 30 (11 A): : 91 - 95
- [29] Key-Insulated Symmetric Key Cryptography and Mitigating Attacks against Cryptographic Cloud Software 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
- [30] A Study of Security Impacts and Cryptographic Techniques in Cloud-based e-Learning Technologies International Journal of Advanced Computer Science and Applications, 2022, 13 (01): : 58 - 66