Method of trajectory privacy protection based on restraining trajectory in LBS. | 0 | 0.34 | 2018 |
The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network | 0 | 0.34 | 2010 |
Computing the m-Tight Error Linear Complexity of Periodic Binary Sequences | 0 | 0.34 | 2009 |
The Tight Error Linear Complexity of Periodic Sequences | 1 | 0.37 | 2009 |
ID-based Weak Blind Signature From Bilinear Pairings | 9 | 0.67 | 2008 |
Payment Scheme For Multi-Party Cascading P2p Exchange | 0 | 0.34 | 2007 |
An ID-based Anonymous Proxy Signature From Bilinear Pairings | 5 | 0.46 | 2006 |
Method of constructing elliptic curve authenticated encryption scheme | 4 | 0.46 | 2005 |