History
1
237


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 237 total

A supportive architecture for CFD-based design optimisation. (English)
Enterprise ISEnterprise IS 8, N0. 2, 246-278(2014)
WorldCat.org
1
Optimal parameters for the WG stream cipher family. (English)
Cryptography and CommunicationsCryptography and Communications 6, N0. 2, 117-135(2014)
WorldCat.org
2
A unified method for finding impossible differentials of block cipher structures. (English)
Inf. Sci.Inf. Sci. 263, 211-220(2014)
WorldCat.org
3
A secure symmetric encryption scheme based on an obfuscator. (Chinese)
Acta Sci. Nat. Univ. Sunyatseni 52, No. 1, 7-11 (2013).
WorldCat.org
4
Correlation of binary sequence families derived from the multiplicative characters of finite fields. (English)
Adv. Math. Commun. 7, No. 4, 475-484 (2013).
WorldCat.org
5
Resilience to distinguishing attacks on WG-7 cipher and their generalizations. (English)
Cryptogr. Commun. 5, No. 4, 277-289 (2013).
WorldCat.org
6
Even periodic and odd periodic complementary sequence pairs from generalized Boolean functions. (English)
Adv. Math. Commun. 7, No. 2, 113-125 (2013).
WorldCat.org
7
The sorting index and permutation codes. (English)
Adv. Appl. Math. 50, No. 3, 367-389 (2013).
WorldCat.org
8
An optimisation method for complex product design. (English)
Enterprise ISEnterprise IS 7, N0. 4, 470-489(2013)
WorldCat.org
9
Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID Applications. (English)
QSHINE, 643-657(2013)
WorldCat.org
10
Optimal contrast based saliency detection. (English)
Pattern Recognition LettersPattern Recognition Letters 34, N0. 11, 1270-1278(2013)
WorldCat.org
11
Hardware implementations of the WG-5 cipher for passive RFID tags. (English)
HOST, 29-34(2013)
WorldCat.org
12
Modeling intelligent vehicle agent in virtual reality traffic simulation system. (English)
ICSCS, 274-279(2013)
WorldCat.org
13
Framework for MIMO cross-layer secure communication based on STBC. (English)
Telecommunication SystemsTelecommunication Systems 52, N0. 4, 2177-2185(2013)
WorldCat.org
14
On the Node Clone Detection in Wireless Sensor Networks. (English)
IEEE/ACM Trans. Netw.IEEE/ACM Trans. Netw. 21, N0. 6, 1799-1811(2013)
WorldCat.org
15
Secure and Efficient LCMQ Entity Authentication Protocol. (English)
IEEE Transactions on Information TheoryIEEE Transactions on Information Theory 59, N0. 6, 4042-4054(2013)
WorldCat.org
16
Revisiting MAC Forgeries, Weak Keys and Provable Security of Galois/Counter Mode of Operation. (English)
CANS, 20-38(2013)
WorldCat.org
17
Large zero correlation zone of Golay pairs and QAM Golay pairs. (English)
ISIT, 3135-3139(2013)
WorldCat.org
18
The Homomorphic Encryption Scheme of Security Obfuscation. (English)
BIC-TA, 595-603(2013)
WorldCat.org
19
WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices. (English)
QSHINE, 617-632(2013)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 237 total

Valid XHTML 1.0 Transitional Valid CSS!