-
1
المؤلفون: Run-Hua Shi
المصدر: IEEE Transactions on Circuits and Systems I: Regular Papers. 68:4221-4231
مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Correctness, business.industry, Computer science, TheoryofComputation_GENERAL, Cryptography, Quantum entanglement, Trusted third party, Computer security, computer.software_genre, Order (exchange), Qubit, ComputingMilieux_COMPUTERSANDSOCIETY, Electrical and Electronic Engineering, IBM, business, computer, Protocol (object-oriented programming)
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::90b66f65241a12f21caea581b8e91b9fTest
https://doi.org/10.1109/tcsi.2021.3103857Test -
2
المؤلفون: Sheng-Lin Yin, Xing-Lan Zhang, Li-Yu Zuo
المصدر: International Journal of Theoretical Physics. 60:3396-3403
مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Authentication, Physics and Astronomy (miscellaneous), Computer science, General Mathematics, Eavesdropping, Data_CODINGANDINFORMATIONTHEORY, Mutual authentication, Shared secret, Computer security, computer.software_genre, Secret sharing, Key (cryptography), Communication source, Quantum information science, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::0e906375364e0d9196467b747e7a30c8Test
https://doi.org/10.1007/s10773-021-04896-9Test -
3
المؤلفون: Qingfeng Cheng, Lu Zhou, Jiaqi Wang, Ning Lu, Wenbo Shi
المصدر: Digital Communications and Networks, Vol 7, Iss 2, Pp 223-234 (2021)
مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Security analysis, Smart contract, Computer Networks and Communications, Computer science, media_common.quotation_subject, Secure spectrum auction, 02 engineering and technology, Information technology, Computer security, computer.software_genre, Paillier cryptosystem, Frequency allocation, Scarcity, 020210 optoelectronics & photonics, Bidders' bids' privacy, 0202 electrical engineering, electronic engineering, information engineering, 5g, media_common, Spectrum auction, Guard (information security), TheoryofComputation_GENERAL, 020206 networking & telecommunications, Public verification, T58.5-58.64, Hardware and Architecture, computer, 5G
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ed0c7d2e622f5b5040c94011b3de20f2Test
http://www.sciencedirect.com/science/article/pii/S235286481930330XTest -
4
المصدر: Information Sciences. 555:386-409
مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Information Systems and Management, Smart contract, Computer science, media_common.quotation_subject, Big data, 02 engineering and technology, Computer security, computer.software_genre, Theoretical Computer Science, Artificial Intelligence, 0202 electrical engineering, electronic engineering, information engineering, Common value auction, Valuation (finance), media_common, Distrust, business.industry, 05 social sciences, TheoryofComputation_GENERAL, 050301 education, Trusted third party, Auction algorithm, Computer Science Applications, Control and Systems Engineering, Collusion, 020201 artificial intelligence & image processing, business, 0503 education, computer, Software
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::89b0eb8831e247fb56af27ca55740749Test
https://doi.org/10.1016/j.ins.2020.10.053Test -
5
المؤلفون: Siu-Ming Yiu, Jun-Zhe Zhu, Gang-Gang Jin, En Zhang, Jiao Du, Ming Li
المصدر: Information Sciences. 546:166-176
مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Information Systems and Management, Smart contract, Computer science, 02 engineering and technology, Encryption, Computer security, computer.software_genre, Secret sharing, Theoretical Computer Science, Artificial Intelligence, 0202 electrical engineering, electronic engineering, information engineering, business.industry, 05 social sciences, 050301 education, Trusted third party, Birkhoff interpolation, Computer Science Applications, Control and Systems Engineering, Key (cryptography), Secure multi-party computation, 020201 artificial intelligence & image processing, business, 0503 education, computer, Software
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::9e78df620aae7fd3cba439b64b59467dTest
https://doi.org/10.1016/j.ins.2020.07.032Test -
6
المؤلفون: Yishi Zhao, Ri-Gui Zhou, Mingyu Huo, WenWen Hu
المصدر: IEEE Access, Vol 9, Pp 22986-22995 (2021)
مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Scheme (programming language), Security analysis, General Computer Science, Computer science, multiparty to multiparty, ComputerApplications_COMPUTERSINOTHERSYSTEMS, Cryptography, Generalized GHZ state, Computer security, computer.software_genre, 01 natural sciences, Unitary state, Secret sharing, 010305 fluids & plasmas, Quantum state, 0103 physical sciences, General Materials Science, Electrical and Electronic Engineering, 010306 general physics, Quantum, computer.programming_language, business.industry, General Engineering, Trusted third party, Greenberger–Horne–Zeilinger state, quantum cryptography, lcsh:Electrical engineering. Electronics. Nuclear engineering, business, lcsh:TK1-9971, computer
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a5847b2fb7e67f85793926c3c3d2fdc6Test
https://doi.org/10.1109/access.2021.3055943Test -
7
المؤلفون: Amina Abd El-Fattah Rashad, Zaki B. Nossair, Magcd Ibrahim
المصدر: MEJ. Mansoura Engineering Journal. 33:1-10
مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Security analysis, Network security, business.industry, Computer science, General Engineering, Cryptography, Computer security, computer.software_genre, Authenticated Key Exchange, Key (cryptography), General Earth and Planetary Sciences, Session key, business, Protocol (object-oriented programming), computer, Key exchange, General Environmental Science
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::512aa52ce491b79e33bf88eb709d72d7Test
https://doi.org/10.21608/bfemu.2020.127484Test -
8
المؤلفون: David Jao, Oleg Taraskin, Jason T. LeGrow, Vladimir Soukharev
المصدر: Journal of Mathematical Cryptology, Vol 15, Iss 1, Pp 18-30 (2020)
مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, password authenticated key establishment, Key establishment, Computer science, 0102 computer and information sciences, 02 engineering and technology, key establishment, Computer security, computer.software_genre, 01 natural sciences, 0202 electrical engineering, electronic engineering, information engineering, QA1-939, Isogeny, Password, Post-quantum cryptography, Authentication, Applied Mathematics, isogenies, post-quantum cryptography, Computer Science Applications, Computational Mathematics, 010201 computation theory & mathematics, authentication, 020201 artificial intelligence & image processing, isogeny-based cryptography, computer, Mathematics
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ed0140f38e4a4fe7b68ffa1bfbca39c2Test
https://doaj.org/article/4d6f16639c144a83bfae2fa0104e4c18Test -
9
المؤلفون: Xiang-Qian Liang, Yan-Ting Han, Yong-Hua Zhang
المصدر: International Journal of Theoretical Physics. 59:3778-3788
مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Authentication, Security analysis, Physics and Astronomy (miscellaneous), 010308 nuclear & particles physics, Computer science, General Mathematics, TheoryofComputation_GENERAL, Bidding, Trusted third party, Computer security, computer.software_genre, 01 natural sciences, 0103 physical sciences, Bid price, 010306 general physics, Personally identifiable information, computer, Quantum teleportation, Anonymity
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::9467cd2fe862d3bb0395018ccd4c5256Test
https://doi.org/10.1007/s10773-020-04631-wTest -
10
المؤلفون: Soodeh Hosseini
المصدر: Cluster Computing. 24:1199-1215
مصطلحات موضوعية: TheoryofComputation_MISCELLANEOUS, Computer Networks and Communications, Computer science, Node (networking), 020206 networking & telecommunications, 02 engineering and technology, biochemical phenomena, metabolism, and nutrition, Computer security, computer.software_genre, 0202 electrical engineering, electronic engineering, information engineering, Malware, 020201 artificial intelligence & image processing, Epidemic model, computer, Software, Heterogeneous network
الوصول الحر: https://explore.openaire.eu/search/publication?articleId=doi_________::8e6c6999d2dc8f607062f4238243cd7cTest
https://doi.org/10.1007/s10586-020-03181-4Test