Search Result: 18results Search Strategy: "匿名性".ckeyword (Phrase)
Individualized services :
Sort:
Results per page:
Selected0results
1
With the increasing number of connected IoT devices, on the one hand, users enjoy various kinds IoT…
2
In modern times, social media play an important role to let the youth know themselves, and …
3
Traditional handover authentication mechanisms are mostly concerned with mutual authentication and …
4
An authenticated group key agreement ensure that entity communicates with each other secure from op…
5
This paper presents a new group key management scheme for Vehicular Ad Hoc Networks (VANETs) that m…
6
In large and dense mobile ad hoc network, location-based routing protocols which use location infor…
7
Countries around the world promote e-invoices recently. To identify buyers of trans- actions, merch…
8
ABSTRACT Due to the evolution of data digitization, improvement of wireless communication technique…
9
With the rapid development of Internet, people can easily share information with each other through…
10
Sealed-bid auction could be applied in many places, such as government engineering, especially the …