Search Result: 14results Search Strategy: "匿名性".ckeyword (Phrase)
Individualized services :
Sort:
Results per page:
Selected0results
1
Traditional handover authentication mechanisms are mostly concerned with mutual authentication and …
2
With the increasing number of connected IoT devices, on the one hand, users enjoy various kinds IoT…
3
In modern times, social media play an important role to let the youth know themselves, and …
4
Countries around the world promote e-invoices recently. To identify buyers of trans- actions, merch…
5
An authenticated group key agreement ensure that entity communicates with each other secure from op…
6
In large and dense mobile ad hoc network, location-based routing protocols which use location infor…
7
ABSTRACT Due to the evolution of data digitization, improvement of wireless communication technique…
8
With the rapid development of Internet, people can easily share information with each other through…
9
Sealed-bid auction could be applied in many places, such as government engineering, especially the …
10
This study extended a traditional communication theory, spiral of silence, to explore the effects o…