权威例句
Cooperative jamming and power allocation with untrusty two-way relay nodesMETHOD, SYSTEM AND DEVICE OF THE ETHERNET TECHNIQUE EXCHANGING AND FORWARDINGA Novel and Secure Non-designated Proxy Signature Scheme for Mobile AgentsPICC: a secure mobile agent framework based on garbled circuitVariance Analysis Based Stealthy Malicious Code DetectionSecurity of Quantum Key Distribution with Entangled Photons Against Individual AttacksSequential decision making with untrustworthy service providersA reputation management system in structured peer-to-peer networksDepth estimation from a sequence of monocular images with known camera motionModularity and intellectual property protection