History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 52 total

Improved improbable differential attacks on ISO standard CLEFIA: expansion technique revisited. (English)
Inf. Process. Lett. 116, No. 2, 136-143 (2016).
WorldCat.org
1
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation. (English)
Int. J. Inf. Sec. 15, N0. 3, 251-269(2016)
WorldCat.org
2
A novel storage covert channel on wearable devices using status bar notifications. (English)
CCNC, 845-848(2016)
WorldCat.org
3
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services. (English)
Knowl. Inf. Syst. 45, N0. 3, 589-615(2015)
WorldCat.org
4
Punctured interval broadcast encryption scheme with free riders. (English)
Inf. Sci. 305, 285-301(2015)
WorldCat.org
5
Impacts of High Concentration of CO2 on the Serum Biochemistry and Carbonic Anhydrase Enzyme Activity of Rainbow Trout, Oncorhynchus mykiss. (English)
HAICTA, 695-698(2015)
WorldCat.org
6
Number Recognition of Sudoku Grid Image with Artificial Neural Networks. (English)
ICONIP (4), 489-496(2015)
WorldCat.org
7
Software defined networking for wireless local networks in Smart Grid. (English)
LCN Workshops, 826-831(2015)
WorldCat.org
8
Privacy-Guaranteeing Bidding in Smart Grid Demand Response Programs. (English)
GLOBECOM Workshops, 1-6(2015)
WorldCat.org
9
Anonymous trace and revoke. (English)
J. Comput. Appl. Math. 259, Part B, 586-591 (2014).
WorldCat.org
10
IND-CCA secure encryption based on a Zheng-Seberry scheme. (English)
J. Comput. Appl. Math. 259, Part B, 529-535 (2014).
WorldCat.org
11
Sharing DSS by the Chinese remainder theorem. (English)
J. Comput. Appl. Math. 259, Part B, 495-502 (2014).
WorldCat.org
12
GLP: A cryptographic approach for group location privacy. (English)
Computer Communications 35, N0. 12, 1527-1533(2012)
WorldCat.org
13
Fractal Dimension Based Shot Transition Detection in Sport Videos. (English)
JSEA 4, N0. 4, 235-243(2011)
WorldCat.org
14
Efficient broadcast encryption with user profiles. (English)
Inf. Sci. 180, No. 6, 1060-1072 (2010).
WorldCat.org
15
Implementation of on-chip training system for cellular neural networks using iterative annealing optimisation method. (English)
IJRIS 2, N0. 3/4, 251-256(2010)
WorldCat.org
16
An improved method for inference of piecewise linear systems by detecting jumps using derivative estimation. (English)
Nonlinear Anal., Hybrid Syst. 3, No. 3, 277-287 (2009).
WorldCat.org
17
Optimal subset-difference broadcast encryption with free riders. (English)
Inf. Sci. 179, No. 20, 3673-3684 (2009).
WorldCat.org
18
Practical threshold signatures with linear secret sharing schemes. (English)
Preneel, Bart (ed.), Progress in cryptology ‒ AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21‒25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 167-178 (2009).
WorldCat.org
19
A verifiable secret sharing scheme based on the Chinese remainder theorem. (English)
Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14‒17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 414-425 (2008).
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 52 total

Valid XHTML 1.0 Transitional Valid CSS!