History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 250 total

Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions. (English)
I. J. Network Security 18, N0. 4, 758-768(2016)
WorldCat.org
1
Another look at XCB. (English)
Cryptogr. Commun. 7, No. 4, Article ID 127, 439-468 (2015).
WorldCat.org
2
Tree based symmetric key broadcast encryption. (English)
J. Discrete Algorithms 34, Article ID 629, 78-107 (2015).
WorldCat.org
3
Role of normalization in spectral clustering for stochastic blockmodels. (English)
Ann. Stat. 43, No. 3, 962-990 (2015).
WorldCat.org
4
Semi Random Position Based Steganography for Resisting Statistical Steganalysis. (English)
I. J. Network Security 17, N0. 1, 57-65(2015)
WorldCat.org
5
Color Image Segmentation By Cuckoo Search. (English)
Intelligent Automation & Soft Computing 21, N0. 4, 673-685(2015)
WorldCat.org
6
Conversion of neutral speech to storytelling style speech. (English)
ICAPR, 1-6(2015)
WorldCat.org
7
A new contrast enhancement method of retinal images in Diabetic Screening System. (English)
ReTIS, 255-260(2015)
WorldCat.org
8
Analysis and modeling pauses for synthesis of storytelling speech based on discourse modes. (English)
IC3, 225-230(2015)
WorldCat.org
9
GA driven integrated exploration of loop unrolling factor and datapath for optimal scheduling of CDFGs during high level synthesis. (English)
CCECE, 75-80(2015)
WorldCat.org
10
The Importance of Being Isolated: An Empirical Study on Chromium Reviews. (English)
ESEM, 78-81(2015)
WorldCat.org
11
Efficient (anonymous) compact HIBE from standard assumptions. (English)
Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9‒10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 243-258 (2014).
WorldCat.org
12
Some randomness experiments on TRIVIUM. (English)
Chakraborty, Rajat Subhra (ed.) et al., Security, privacy, and applied cryptography engineering. 4th international conference, SPACE 2014, Pune, India, October 18‒22, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12059-1/pbk). Lecture Notes in Computer Science 8804, 219-236 (2014).
WorldCat.org
13
A huffman code based image steganography technique. (English)
Gupta, Prosenjit (ed.) et al., Applied algorithms. First international conference, ICAA 2014, Kolkata, India, January 13‒15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04125-4/pbk). Lecture Notes in Computer Science 8321, 257-265 (2014).
WorldCat.org
14
Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. (English)
Lecture Notes in Computer Science 8873. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). xx, 574~p. EUR~77.04 (2014).
WorldCat.org
15
Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014, Proceedings, Part II. (English)
Lecture Notes in Computer Science 8874. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). xxii, 528~p. EUR~77.04 (2014).
WorldCat.org
16
Nonparametric link prediction in large scale dynamic networks. (English)
Electron. J. Stat. 8, No. 2, 2022-2065, electronic only (2014).
WorldCat.org
17
Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector. (English)
Cryptogr. Commun. 6, No. 3, 189-231 (2014).
WorldCat.org
18
Getting Your Big Data Priorities Straight: A Demonstration of Priority-based QoS using Social-network-driven Stock Recommendation. (English)
PVLDB 7, N0. 13, 1665-1668(2014)
WorldCat.org
19
An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse. (English)
CISIM, 327-338(2014)
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 250 total

Valid XHTML 1.0 Transitional Valid CSS!