History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 67 total

Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 446-464 (2014).
WorldCat.org
1
Lazy modulus switching for the BKW algorithm on LWE. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 429-445 (2014).
WorldCat.org
2
Determining near optimal base-stock levels in two-stage general inventory systems. (English)
European Journal of Operational ResearchEuropean Journal of Operational Research 232, N0. 2, 342-349(2014)
WorldCat.org
3
Exploring mobile representations of folksonomies to support the example context of a community gardening project. (English)
Mobile HCI, 528-533(2013)
WorldCat.org
4
NetworkPrioritizer: a versatile tool for network-based prioritization of candidate disease genes or other molecules. (English)
BioinformaticsBioinformatics 29, N0. 11, 1471-1473(2013)
WorldCat.org
5
Making work queue cluster-friendly for data intensive scientific applications. (English)
CLUSTER, 1-8(2013)
WorldCat.org
6
Improvement of Formula and Uncertainty of the Reference Magnetic Field for AC Magnetometer Calibration. (English)
IEEE T. Instrumentation and MeasurementIEEE T. Instrumentation and Measurement 62, N0. 6, 1443-1449(2013)
WorldCat.org
7
On the relation between the MXL family of algorithms and Gröbner basis algorithms. (English)
J. Symb. Comput. 47, No. 8, 926-941 (2012).
WorldCat.org
8
The M4RIE library for dense linear algebra over small fields with even characteristic. (English)
ISSAC, 28-34(2012)
WorldCat.org
9
Dimming of LED LCD Backlights. (English)
Handbook of Visual Display Technology, 567-574(2012)
WorldCat.org
10
Conditional motion vector refinement for improved prediction. (English)
PCS, 497-500(2012)
WorldCat.org
11
Novel search method for the discovery of functional relationships. (English)
BioinformaticsBioinformatics 28, N0. 2, 269-276(2012)
WorldCat.org
12
Breaking an identity-based encryption scheme based on DHIES. (English)
Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12‒15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 344-355 (2011).
WorldCat.org
13
Polly cracker, revisited. (English)
Lee, Dong Hoon (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4‒8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 179-196 (2011).
WorldCat.org
14
Algebraic precomputations in differential and integral cryptanalysis. (English)
Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20‒24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 387-403 (2011).
WorldCat.org
15
On cipher-dependent related-key attacks in the ideal-cipher model. (English)
Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13‒16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 128-145 (2011).
WorldCat.org
16
Cold boot key recovery by solving polynomial systems with noise. (English)
Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7‒10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 57-72 (2011).
WorldCat.org
17
Using eye tracking for interaction. (English)
CHI Extended Abstracts, 741-744(2011)
WorldCat.org
18
DIDO: a disease-determinants ontology from web sources. (English)
WWW (Companion Volume), 237-240(2011)
WorldCat.org
19
Altanalyze and domaingraph: analyzing and visualizing exon expression data. (English)
Nucleic Acids Res. 38, No. Web-Server-Issue, 755-762 (2010).
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 67 total

Valid XHTML 1.0 Transitional Valid CSS!