Home > Papers > Basic-Subject-of-Computer-science-and-technology

 
  There are 8 papers published in subject: > since this site started.
  Results per page:
Select Subject
   All (8830)
Agronomy (158)
Animal Husbandry,... (64)
Aquatic Science (16)
Astronomy (36)
Aviation (22)
Basic Medicine (184)
Biology (504)
Chemical Engineering (103)
Chemistry (635)
Civil and Archite... (105)
Clinical Medicine (236)
Computer Science ... (924)
Dynamic and Elect... (121)
Earth Science (119)
Economics (67)
Education (31)
Electrics, Commun... (927)
Energy Science an... (67)
Engineering and T... (15)
Environmental Sci... (140)
Food Science and ... (63)
Forestry (36)
Hydraulic Enginee... (40)
Mechanics (240)
Metallurgical Eng... (32)
Mine Engineering ... (38)
Nuclear Science a... (21)
Pharmacy (98)
Physics (920)
Preventive Medici... (37)
Psychology (20)
Security Science ... (17)
Sports Science (6)
Surveying and Map... (15)
Textile Science a... (16)
Traditional Chine... (56)
Transportation En... (57)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
1. Parameterized Approximation Algorithms for the Shallow-Light Steiner Tree Problem
  GUO Longkun, LIAO Kewen, SHEN Hong
  Computer Science and Technology 02 June 2015
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
2. Buyer-seller watermarking protocols suitable for probabilistic privacy homomorphisms
  ZENG Peng
  Computer Science and Technology 10 November 2014
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
3. Security Enhancement to a User Authentication Scheme for Multi-Server Environment
  ZENG Peng
  Computer Science and Technology 29 October 2014
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
4. Generalized Format-preserving Encryption for Character Data
  Ma Haoyu,Liu Zheli,Jia Chunfu,Yuan Ke
  Computer Science and Technology 04 May 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
5. Symmetric Bayesian-Nash Equilibrium of Simultaneous Vickrey Auctions with Perfect Substitutes
  Bu Tianming,Qi Qi
  Computer Science and Technology 08 January 2013
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
6. Parallel hash function using DM-based integer-valued chaotic maps network
  Liao Dong,Wang Xiaomin
  Computer Science and Technology 10 December 2012
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
7. Conditionally Anonymous Ring Signature \ Scheme without Random Oracles
  Zeng Shengke,Qin Zhiguang,Lu Qing
  Computer Science and Technology 08 February 2012
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
8. Advanced Framework for Iterative Hash Functions---C-hash
  Zhimin Li,Bo Yang,Lin Li,Shihui Zheng,Yixian Yang,Zhang Zhihui
  Computer Science and Technology 14 November 2007
  Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B)
Select/Unselect all For Selected Papers

Saved Papers

Please enter a name for this paper to be shown in your personalized Saved Papers list
  Results per page: