History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 230 total

Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector. (English)
Cryptogr. Commun. 6, No. 3, 189-231 (2014).
WorldCat.org
1
Location-Based Image Steganography. (English)
Smart CRSmart CR 4, 130-139(2014)
WorldCat.org
2
An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse. (English)
CISIM, 327-338(2014)
WorldCat.org
3
Efficient (Anonymous) Compact HIBE from Standard Assumptions. (English)
ProvSec, 243-258(2014)
WorldCat.org
4
A Tutorial on Different Classification Techniques for Remotely Sensed Imagery Datasets. (English)
Smart CRSmart CR 4, 34-43(2014)
WorldCat.org
5
Scaling Up Crowd-Sourcing to Very Large Datasets: A Case for Active Learning. (English)
PVLDBPVLDB 8, N0. 2, 125-136(2014)
WorldCat.org
6
Some Randomness Experiments on TRIVIUM. (English)
SPACE, 219-236(2014)
WorldCat.org
7
Designing prosody rule-set for converting neutral TTS speech to storytelling style speech for Indian languages: Bengali, Hindi and Telugu. (English)
IC3, 473-477(2014)
WorldCat.org
8
Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme. (English)
IEEE Trans. ComputersIEEE Trans. Computers 63, N0. 7, 1709-1722(2014)
WorldCat.org
10
A Huffman Code Based Image Steganography Technique. (English)
ICAA, 257-265(2014)
WorldCat.org
11
Getting Your Big Data Priorities Straight: A Demonstration of Priority-based QoS using Social-network-driven Stock Recommendation. (English)
PVLDBPVLDB 7, N0. 13, 1665-1668(2014)
WorldCat.org
12
How Many Eyeballs Does a Bug Need? An Empirical Validation of Linus’ Law. (English)
XP, 242-250(2014)
WorldCat.org
13
Anonymous constant-size ciphertext HIBE from asymmetric pairings. (English)
Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17‒19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 344-363 (2013).
WorldCat.org
14
Advances in cryptology ‒ ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1‒5, 2013. Proceedings, Part I. (English)
Lecture Notes in Computer Science 8269. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). xxiii, 546~p. EUR~74.90 (2013).
WorldCat.org
15
Advances in cryptology ‒ ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1‒5, 2013. Proceedings, Part II. (English)
Lecture Notes in Computer Science 8270. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). xxiii, 542~p. EUR~74.90 (2013).
WorldCat.org
16
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption. (English)
Int. J. Appl. Cryptogr. 3, No. 1, 47-83 (2013).
WorldCat.org
17
A new multi-linear universal hash family. (English)
Des. Codes Cryptography 69, No. 3, 351-367 (2013).
WorldCat.org
18
Complete tree subset difference broadcast encryption scheme and its analysis. (English)
Des. Codes Cryptography 66, No. 1-3, 335-362 (2013).
WorldCat.org
19
Code based KPD scheme with full connectivity: deterministic merging. (English)
Mustofa, Khabib (ed.) et al., Information and communicatiaon technology. International conference, ICT-Eurasia 2013, Yogyakarta, Indonesia, March 25‒29, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36817-2/pbk). Lecture Notes in Computer Science 7804, 141-151 (2013).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 230 total

Valid XHTML 1.0 Transitional Valid CSS!