Search

Showing total 5 results
5 results

Search Results

1. Pseudoinverse solution to construction of cubic splines.

2. Safety transition system and its application.

3. Multi-authority attribute based signature scheme suitable for distributed system.

4. Malware detection by monitoring host's activities.

5. Analysis and improvement of a certificateless proxy blind signature.