History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 52 total

An exploration of affine group laws for elliptic curves. (English)
J. Math. Cryptol. 5, No. 1, 1-50 (2011).
WorldCat.org
1
A spatially weighted principal component analysis for multi-element geochemical data for mapping locations of felsic intrusions in the Gejiu mineral district of Yunnan, China. (English)
Computers & GeosciencesComputers & Geosciences 37, N0. 5, 662-669(2011)
WorldCat.org
2
Biological information as set-based complexity. (English)
IEEE Transactions on Information TheoryIEEE Transactions on Information Theory 56, N0. 2, 667-677(2010)
WorldCat.org
3
Remotely sensed spectral heterogeneity as a proxy of species diversity: Recent advances and open challenges. (English)
Ecological InformaticsEcological Informatics 5, N0. 5, 318-329(2010)
WorldCat.org
4
Using Generalised Dissimilarity Models and many small samples to improve the efficiency of regional and landscape scale invertebrate sampling. (English)
Ecological InformaticsEcological Informatics 5, N0. 2, 124-132(2010)
WorldCat.org
5
Jacobi quartic curves revisited. (English)
Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1‒3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 452-468 (2009).
WorldCat.org
6
Detection Capabilities of Randomly-Deployed Sensor Fields. (English)
IJDSNIJDSN 5, N0. 6, 708-728(2009)
WorldCat.org
7
Twisted Edwards curves revisited. (English)
Pieprzyk, Josef (ed.), Advances in cryptology ‒ ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7‒11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 326-343 (2008).
WorldCat.org
8
Set-based complexity and biological information. (English)
Comput. Res. Repos. 2008, Article No. 0801.4024 (2008).
WorldCat.org
9
Detection capabilities of randomly-deployed underwater sensors. (English)
ICASSP, 1493-1496(2008)
WorldCat.org
10
New formulae for efficient elliptic curve arithmetic. (English)
Srinathan, K. (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9‒13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). Lecture Notes in Computer Science 4859, 138-151 (2007).
WorldCat.org
11
Implementation of extension field arithmetic with applications to torus-based cryptography. (English)
Dorfer, G. (ed.) et al., Proceedings of the 70th workshop on general algebra “70. Arbeitstagung Allgemeine Algebra", Vienna, Austria, May 26‒29, 2005. Klagenfurt: Verlag Johannes Heyn (ISBN 3-7084-0194-8/pbk). Contributions to General Algebra 17, 201-216 (2006).
WorldCat.org
12
Time dependent neural network models for detecting changes of state in complex processes: applications in earth sciences and astronomy. (English)
Neural Netw. 19, No. 2, 196-207 (2006).
WorldCat.org
13
Editorial. (English)
Computers & GeosciencesComputers & Geosciences 32, N0. 5, 561-564(2006)
WorldCat.org
14
RAK factoring algorithm. (English)
Australas. J. Comb. 33, 291-305 (2005).
WorldCat.org
15
Inferring network interactions within a cell. (English)
Briefings in BioinformaticsBriefings in Bioinformatics 6, N0. 4, 380-389(2005)
WorldCat.org
16
Software Refinement with Perfect Developer. (English)
SEFM, 363-373(2005)
WorldCat.org
17
Agustin Rodriguez-Bachiller, John Glasson (Eds.), Expert Systems and Geographic Information Systems for Impact Assessment, Taylor & Francis, London, New York, ISBN 0-415-30725-2, 0-415-30724-4 (400pp., US$39.95 (paperback), US$94.95 (hardback)). (English)
Computers & GeosciencesComputers & Geosciences 31, N0. 10, 1293-1294(2005)
WorldCat.org
18
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. (English)
Int. J. Inf. Secur. 3, No. 2, 86-98 (2004).
WorldCat.org
19
The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. (English)
Int. J. Inf. Secur. 3, No. 2, 86-98 (2004).
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 52 total

Valid XHTML 1.0 Transitional Valid CSS!