- 充值
- 会员
- 职称材料
文献信息
Network SecurityPublic Key CryptographyIntrusion DetectionRandom Oracle ModelPrivacy ProtectionAccess ControlElliptic Curve CryptographyAuthentication ProtocolData PrivacyCryptographyCloud StorageBilinear PairingInternet of ThingsBilinear PairingsIntrusion Detection SystemsCloud ComputingHash FunctionsKey AgreementPublic KeyWireless Sensor Networks
vol.28 (2026)
vol.27 (2025)
vol.26 (2024)
vol.25 (2023)
vol.24 (2022)
vol.23 (2021)
vol.22 (2020)
vol.21 (2019)
vol.20 (2018)
vol.19 (2017)
vol.18 (2016)
vol.17 (2015)
vol.16 (2014)
vol.15 (2013)
vol.14 (2012)
vol.13 (2011)
vol.12 (2011)
vol.11 (2010)
vol.10 (2010)
vol.9 (2009)
vol.8 (2009)
vol.7 (2008)
vol.6 (2008)
vol.7 (2007)
vol.5 (2007)
vol.4 (2007)
vol.3 (2006)
vol.2 (2006)
vol.1 (2005)