History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 39 total

GLP: A cryptographic approach for group location privacy. (English)
Computer CommunicationsComputer Communications 35, N0. 12, 1527-1533(2012)
WorldCat.org
1
Fractal Dimension Based Shot Transition Detection in Sport Videos. (English)
JSEAJSEA 4, N0. 4, 235-243(2011)
WorldCat.org
2
Efficient broadcast encryption with user profiles. (English)
Inf. Sci. 180, No. 6, 1060-1072 (2010).
WorldCat.org
3
An improved method for inference of piecewise linear systems by detecting jumps using derivative estimation. (English)
Nonlinear Anal., Hybrid Syst. 3, No. 3, 277-287 (2009).
WorldCat.org
4
Optimal subset-difference broadcast encryption with free riders. (English)
Inf. Sci. 179, No. 20, 3673-3684 (2009).
WorldCat.org
5
Practical threshold signatures with linear secret sharing schemes. (English)
Preneel, Bart (ed.), Progress in cryptology ‒ AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21‒25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 167-178 (2009).
WorldCat.org
6
A verifiable secret sharing scheme based on the Chinese remainder theorem. (English)
Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14‒17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 414-425 (2008).
WorldCat.org
7
A meet-in-the-middle attack on 8-round AES. (English)
Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10‒13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 116-126 (2008).
WorldCat.org
8
Robust threshold schemes based on the Chinese remainder theorem. (English)
Vaudenay, Serge (ed.), Progress in cryptology ‒ AFRICACRYPT 2008. First international conference on cryptology in Africa, Casablanca, Morocco, June 11‒14, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68159-5/pbk). Lecture Notes in Computer Science 5023, 94-108 (2008).
WorldCat.org
9
On probability of success in linear and differential cryptanalysis. (English)
J. Cryptology 21, No. 1, 131-147 (2008).
WorldCat.org
10
A Reputation-based Trust Management System for P2P Networks. (English)
I. J. Network SecurityI. J. Network Security 6, N0. 2, 227-237(2008)
WorldCat.org
11
UQBE: uncertain query by example for web service mashup. (English)
SIGMOD Conference, 1275-1280(2008)
WorldCat.org
12
Virtual active network for live streaming media delivery. (English)
J. Interconnect. Netw. 8, No. 1, 45-74 (2007).
WorldCat.org
13
Improved DST cryptanalysis of IDEA. (English)
Biham, Eli (ed.) et al., Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17‒18, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74461-0/pbk). Lecture Notes in Computer Science 4356, 1-14 (2007).
WorldCat.org
14
Threshold cryptography based on Asmuth-Bloom secret sharing. (English)
Inf. Sci. 177, No. 19, 4148-4160 (2007).
WorldCat.org
15
Virtual active network for live streaming media delivery. (English)
J. Interconnect. Netw. 8, No. 1, 45-74 (2007).
WorldCat.org
16
Resource constrained project scheduling: a hybrid neural approach. (English)
Józefowska, Joanna (ed.) et al., Perspectives in modern project scheduling. New York, NY: Springer (ISBN 0-387-33643-5/hbk). International Series in Operations Research \& Management Science 92, 297-318 (2006).
WorldCat.org
17
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing. (English)
ISCIS, 935-942(2006)
WorldCat.org
18
Capture Resilient ElGamal Signature Protocols. (English)
ISCIS, 943-951(2006)
WorldCat.org
19
Non-greedy heuristics and augmented neural networks for the open-shop scheduling problem. (English)
Nav. Res. Logist. 52, No. 7, 631-644 (2005).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 39 total

Valid XHTML 1.0 Transitional Valid CSS!