History
1
231


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 231 total

A supportive architecture for CFD-based design optimisation. (English)
Enterprise ISEnterprise IS 8, N0. 2, 246-278(2014)
WorldCat.org
1
Correlation of binary sequence families derived from the multiplicative characters of finite fields. (English)
Adv. Math. Commun. 7, No. 4, 475-484 (2013).
WorldCat.org
2
Resilience to distinguishing attacks on WG-7 cipher and their generalizations. (English)
Cryptogr. Commun. 5, No. 4, 277-289 (2013).
WorldCat.org
3
Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions. (English)
Adv. Math. Commun. 7, No. 2, 113-125 (2013).
WorldCat.org
4
The sorting index and permutation codes. (English)
Adv. Appl. Math. 50, No. 3, 367-389 (2013).
WorldCat.org
5
Multi-agent based architecture for virtual reality intelligent simulation system of vehicles. (English)
ICNSC, 597-602(2013)
WorldCat.org
6
Hardware implementations of the WG-5 cipher for passive RFID tags. (English)
HOST, 29-34(2013)
WorldCat.org
7
Framework for MIMO cross-layer secure communication based on STBC. (English)
Telecommunication SystemsTelecommunication Systems 52, N0. 4, 2177-2185(2013)
WorldCat.org
8
Secure and Efficient LCMQ Entity Authentication Protocol. (English)
IEEE Transactions on Information TheoryIEEE Transactions on Information Theory 59, N0. 6, 4042-4054(2013)
WorldCat.org
9
Large zero correlation zone of Golay pairs and QAM Golay pairs. (English)
ISIT, 3135-3139(2013)
WorldCat.org
10
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. (English)
QSHINE, 617-632(2013)
WorldCat.org
11
Optimal contrast based saliency detection. (English)
Pattern Recognition LettersPattern Recognition Letters 34, N0. 11, 1270-1278(2013)
WorldCat.org
12
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation. (English)
CANS, 20-38(2013)
WorldCat.org
13
Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID Applications. (English)
QSHINE, 643-657(2013)
WorldCat.org
14
The Homomorphic Encryption Scheme of Security Obfuscation. (English)
BIC-TA, 595-603(2013)
WorldCat.org
15
On the Node Clone Detection in Wireless Sensor Networks. (English)
IEEE/ACM Trans. Netw.IEEE/ACM Trans. Netw. 21, N0. 6, 1799-1811(2013)
WorldCat.org
16
An optimisation method for complex product design. (English)
Enterprise ISEnterprise IS 7, N0. 4, 470-489(2013)
WorldCat.org
17
On the security of Hummingbird-2 against side channel cube attacks. (English)
Armknecht, Frederik (ed.) et al., Research in cryptology. 4th Western European workshop, WEWoRC 2011, Weimar, Germany, July 20‒22, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34158-8/pbk). Lecture Notes in Computer Science 7242, 18-29 (2012).
WorldCat.org
18
New three-valued Walsh transforms from decimations of Helleseth-Gong sequences. (English)
Helleseth, Tor (ed.) et al., Sequences and their applications ‒ SETA 2012. 7th international conference, Waterloo, ON, Canada, June 4‒8, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30614-3/pbk). Lecture Notes in Computer Science 7280, 327-337 (2012).
WorldCat.org
19
Odd perfect sequences and sets of spreading sequences with zero or low odd periodic correlation zone. (English)
Helleseth, Tor (ed.) et al., Sequences and their applications ‒ SETA 2012. 7th international conference, Waterloo, ON, Canada, June 4‒8, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30614-3/pbk). Lecture Notes in Computer Science 7280, 1-12 (2012).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 231 total

Valid XHTML 1.0 Transitional Valid CSS!