History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 48 total

Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited. (English)
Inf. Process. Lett. 116, No. 2, Article ID 5339, 136-143 (2016).
WorldCat.org
1
Number Recognition of Sudoku Grid Image with Artificial Neural Networks. (English)
ICONIP (4), 489-496(2015)
WorldCat.org
2
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services. (English)
Knowl. Inf. Syst. 45, N0. 3, 589-615(2015)
WorldCat.org
3
Punctured interval broadcast encryption scheme with free riders. (English)
Inf. Sci. 305, 285-301(2015)
WorldCat.org
4
Impacts of High Concentration of CO2 on the Serum Biochemistry and Carbonic Anhydrase Enzyme Activity of Rainbow Trout, Oncorhynchus mykiss. (English)
HAICTA, 695-698(2015)
WorldCat.org
5
Anonymous trace and revoke. (English)
J. Comput. Appl. Math. 259, Part B, 586-591 (2014).
WorldCat.org
6
IND-CCA secure encryption based on a Zheng-Seberry scheme. (English)
J. Comput. Appl. Math. 259, Part B, 529-535 (2014).
WorldCat.org
7
Sharing DSS by the Chinese remainder theorem. (English)
J. Comput. Appl. Math. 259, Part B, 495-502 (2014).
WorldCat.org
8
GLP: A cryptographic approach for group location privacy. (English)
Computer Communications 35, N0. 12, 1527-1533(2012)
WorldCat.org
9
Fractal Dimension Based Shot Transition Detection in Sport Videos. (English)
JSEA 4, N0. 4, 235-243(2011)
WorldCat.org
10
Efficient broadcast encryption with user profiles. (English)
Inf. Sci. 180, No. 6, 1060-1072 (2010).
WorldCat.org
11
Implementation of on-chip training system for cellular neural networks using iterative annealing optimisation method. (English)
IJRIS 2, N0. 3/4, 251-256(2010)
WorldCat.org
12
An improved method for inference of piecewise linear systems by detecting jumps using derivative estimation. (English)
Nonlinear Anal., Hybrid Syst. 3, No. 3, 277-287 (2009).
WorldCat.org
13
Optimal subset-difference broadcast encryption with free riders. (English)
Inf. Sci. 179, No. 20, 3673-3684 (2009).
WorldCat.org
14
Practical threshold signatures with linear secret sharing schemes. (English)
Preneel, Bart (ed.), Progress in cryptology ‒ AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21‒25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 167-178 (2009).
WorldCat.org
15
A verifiable secret sharing scheme based on the Chinese remainder theorem. (English)
Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14‒17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 414-425 (2008).
WorldCat.org
16
A meet-in-the-middle attack on 8-round AES. (English)
Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10‒13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 116-126 (2008).
WorldCat.org
17
Robust threshold schemes based on the Chinese remainder theorem. (English)
Vaudenay, Serge (ed.), Progress in cryptology ‒ AFRICACRYPT 2008. First international conference on cryptology in Africa, Casablanca, Morocco, June 11‒14, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68159-5/pbk). Lecture Notes in Computer Science 5023, 94-108 (2008).
WorldCat.org
18
On probability of success in linear and differential cryptanalysis. (English)
J. Cryptology 21, No. 1, 131-147 (2008).
WorldCat.org
19
A Reputation-based Trust Management System for P2P Networks. (English)
I. J. Network Security 6, N0. 2, 227-237(2008)
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 48 total

Valid XHTML 1.0 Transitional Valid CSS!