权威例句
Cooperative jamming and power allocation with untrusty two-way relay nodes
METHOD, SYSTEM AND DEVICE OF THE ETHERNET TECHNIQUE EXCHANGING AND FORWARDING
A Novel and Secure Non-designated Proxy Signature Scheme for Mobile Agents
PICC: a secure mobile agent framework based on garbled circuit
Variance Analysis Based Stealthy Malicious Code Detection
Security of Quantum Key Distribution with Entangled Photons Against Individual Attacks
Sequential decision making with untrustworthy service providers
A reputation management system in structured peer-to-peer networks
Depth estimation from a sequence of monocular images with known camera motion
Modularity and intellectual property protection