Release Time:2023-12-11 Hits:
Date of Publication: 2022-10-02
Journal: 中国计算机科学前沿 英文版
Volume: 15
Issue: 2
ISSN: 2095-2228
Prev One:Efficient key generation leveraging wireless channel reciprocity and discrete cosine transform
Next One:Hierarchical remote data possession checking method based on massive cloud files