共 50 条
- [41] Verifiable Secret Sharing Scheme Using Hash Values 2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 405 - 409
- [42] A hash tree based authentication scheme in SIP applications 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1510 - 1514
- [43] Perceptual image Hash scheme based on multiple features Guangdianzi Jiguang/Journal of Optoelectronics Laser, 2008, 19 (11): : 1516 - 1520
- [44] A Hash Function Scheme for key management in UMTS MBMS GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 5148 - +
- [45] A secure user authentication scheme using hash functions Operating Systems Review (ACM), 2004, 38 (02): : 62 - 68
- [46] A combined hash and encryption scheme by chaotic neural network ADVANCES IN NEURAL NETWORKS - ISNN 2004, PT 2, 2004, 3174 : 633 - 638
- [48] DePass: A Secure Hash-based Authentication Scheme 2017 INTELLIGENT SYSTEMS AND COMPUTER VISION (ISCV), 2017,
- [49] Image Hash Authentication Scheme Based on Composite Domain 2014 INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING AND AUTOMATION (ICMEA), 2014, : 268 - 273