History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 258 total

Another look at normal approximations in cryptanalysis. (English)
J. Math. Cryptol. 10, No. 2, Article ID jmc-2016-0006, 69-99 (2016).
WorldCat.org
1
Secured Genetic Algorithm Based Image Hiding Technique with Boolean Functions. (English)
I. J. Network Security 18, N0. 4, 758-768(2016)
WorldCat.org
2
Answering enumeration queries with the crowd. (English)
Commun. ACM 59, N0. 1, 118-127(2016)
WorldCat.org
3
Pedestrian Warrants for Developing Countries by Simulation Approach. (English)
ANT/SEIT, 665-669(2016)
WorldCat.org
4
New Complexity Trade-Offs for the (Multiple) Number Field Sieve Algorithm in Non-Prime Fields. (English)
EUROCRYPT (1), 429-458(2016)
WorldCat.org
5
Evaluating User Needs in Wellness Apps. (English)
Int. J. Hum. Comput. Interaction 32, N0. 2, 119-131(2016)
WorldCat.org
6
An ant colony system based control of shunt capacitor banks for bulk electricity consumers. (English)
Appl. Soft Comput. 43, 520-534(2016)
WorldCat.org
7
Another look at XCB. (English)
Cryptogr. Commun. 7, No. 4, 439-468, electronic only (2015).
WorldCat.org
8
Tree based symmetric key broadcast encryption. (English)
J. Discrete Algorithms 34, 78-107 (2015).
WorldCat.org
9
Role of normalization in spectral clustering for stochastic blockmodels. (English)
Ann. Stat. 43, No. 3, 962-990 (2015).
WorldCat.org
10
A new contrast enhancement method of retinal images in Diabetic Screening System. (English)
ReTIS, 255-260(2015)
WorldCat.org
11
The Importance of Being Isolated: An Empirical Study on Chromium Reviews. (English)
ESEM, 78-81(2015)
WorldCat.org
12
Semi Random Position Based Steganography for Resisting Statistical Steganalysis. (English)
I. J. Network Security 17, N0. 1, 57-65(2015)
WorldCat.org
13
The Consistency of Common Neighbors for Link Prediction in Stochastic Blockmodels. (English)
NIPS, 3016-3024(2015)
WorldCat.org
14
GA driven integrated exploration of loop unrolling factor and datapath for optimal scheduling of CDFGs during high level synthesis. (English)
CCECE, 75-80(2015)
WorldCat.org
15
Color Image Segmentation By Cuckoo Search. (English)
Intelligent Automation & Soft Computing 21, N0. 4, 673-685(2015)
WorldCat.org
16
Analysis and modeling pauses for synthesis of storytelling speech based on discourse modes. (English)
IC3, 225-230(2015)
WorldCat.org
17
Conversion of neutral speech to storytelling style speech. (English)
ICAPR, 1-6(2015)
WorldCat.org
18
Efficient (anonymous) compact HIBE from standard assumptions. (English)
Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9‒10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 243-258 (2014).
WorldCat.org
19
Some randomness experiments on TRIVIUM. (English)
Chakraborty, Rajat Subhra (ed.) et al., Security, privacy, and applied cryptography engineering. 4th international conference, SPACE 2014, Pune, India, October 18‒22, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12059-1/pbk). Lecture Notes in Computer Science 8804, 219-236 (2014).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 258 total

Valid XHTML 1.0 Transitional Valid CSS!