History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 237 total

Semi Random Position Based Steganography for Resisting Statistical Steganalysis. (English)
I. J. Network SecurityI. J. Network Security 17, N0. 1, 57-65(2015)
WorldCat.org
1
A huffman code based image steganography technique. (English)
Gupta, Prosenjit (ed.) et al., Applied algorithms. First international conference, ICAA 2014, Kolkata, India, January 13‒15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04125-4/pbk). Lecture Notes in Computer Science 8321, 257-265 (2014).
WorldCat.org
2
Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. (English)
Lecture Notes in Computer Science 8873. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). xx, 574~p. EUR~77.04 (2014).
WorldCat.org
3
Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014, Proceedings, Part II. (English)
Lecture Notes in Computer Science 8874. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). xxii, 528~p. EUR~77.04 (2014).
WorldCat.org
4
Nonparametric link prediction in large scale dynamic networks. (English)
Electron. J. Stat. 8, No. 2, 2022-2065, electronic only (2014).
WorldCat.org
5
Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector. (English)
Cryptogr. Commun. 6, No. 3, 189-231 (2014).
WorldCat.org
6
Concrete Analysis and Trade-Offs for the (Complete Tree) Layered Subset Difference Broadcast Encryption Scheme. (English)
IEEE Trans. ComputersIEEE Trans. Computers 63, N0. 7, 1709-1722(2014)
WorldCat.org
7
A comprehensive fault diagnosis technique for reversible logic circuits. (English)
Computers & Electrical EngineeringComputers & Electrical Engineering 40, N0. 7, 2259-2272(2014)
WorldCat.org
8
Some Randomness Experiments on TRIVIUM. (English)
SPACE, 219-236(2014)
WorldCat.org
9
A Tutorial on Different Classification Techniques for Remotely Sensed Imagery Datasets. (English)
Smart CRSmart CR 4, 34-43(2014)
WorldCat.org
10
An Approach to Continuous Pervasive Care of Remote Patients Based on Priority Based Assignment of Nurse. (English)
CISIM, 327-338(2014)
WorldCat.org
11
Location-Based Image Steganography. (English)
Smart CRSmart CR 4, 130-139(2014)
WorldCat.org
12
Designing prosody rule-set for converting neutral TTS speech to storytelling style speech for Indian languages: Bengali, Hindi and Telugu. (English)
IC3, 473-477(2014)
WorldCat.org
13
How Many Eyeballs Does a Bug Need? An Empirical Validation of Linus’ Law. (English)
XP, 242-250(2014)
WorldCat.org
14
Efficient (Anonymous) Compact HIBE from Standard Assumptions. (English)
ProvSec, 243-258(2014)
WorldCat.org
15
Getting Your Big Data Priorities Straight: A Demonstration of Priority-based QoS using Social-network-driven Stock Recommendation. (English)
PVLDBPVLDB 7, N0. 13, 1665-1668(2014)
WorldCat.org
17
Scaling Up Crowd-Sourcing to Very Large Datasets: A Case for Active Learning. (English)
PVLDBPVLDB 8, N0. 2, 125-136(2014)
WorldCat.org
18
Towards a More Democratic Mining in Bitcoins. (English)
ICISS, 185-203(2014)
WorldCat.org
19
Code based KPD scheme with full connectivity: deterministic merging. (English)
Mustofa, Khabib (ed.) et al., Information and communicatiaon technology. International conference, ICT-Eurasia 2013, Yogyakarta, Indonesia, March 25‒29, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36817-2/pbk). Lecture Notes in Computer Science 7804, 141-151 (2013).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 237 total

Valid XHTML 1.0 Transitional Valid CSS!