- 充值
- 会员
- 职称材料
文献信息
Network SecurityPublic Key CryptographyIntrusion DetectionRandom Oracle ModelPrivacy ProtectionAccess ControlAuthentication ProtocolElliptic Curve CryptographyData PrivacyCryptographyCloud StorageBilinear PairingInternet of ThingsBilinear PairingsIntrusion Detection SystemsCloud ComputingHash FunctionsKey AgreementPublic KeyWireless Sensor Networks
vol.28 (2026)
vol.27 (2025)
vol.26 (2024)
vol.25 (2023)
vol.24 (2022)
vol.23 (2021)
vol.22 (2020)
vol.21 (2019)
vol.20 (2018)
vol.19 (2017)
vol.18 (2016)
vol.17 (2015)
vol.16 (2014)
vol.15 (2013)
vol.14 (2012)
vol.13 (2011)
vol.12 (2011)
vol.11 (2010)
vol.10 (2010)
vol.9 (2009)
vol.8 (2009)
vol.7 (2008)
vol.6 (2008)
vol.7 (2007)
vol.5 (2007)
vol.4 (2007)
vol.3 (2006)
vol.2 (2006)
vol.1 (2005)