Your search for 37936 returns 280 document(s) |
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122 |
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Generalized key-evolving signature schemes or how to foil an armed adversary, (LNCS-Lecture Notes in Computer Science 2576) Hal 151-168 |
Author: Gene Itkis; Peng Xie; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Receipt-free electronic voting schemes for large scale elections,(LNCS-Lecture Notes in Computer Science 1361) Hal 25-35 |
Author: Tatsuaki Okamoto; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On signature schemes with threshold verification detecting malicious verifiers, (LNCS-Lecture Notes in Computer Science 1361) Hal 67-78 |
Author: Holger Petersen; Markus Michels; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On ideal non-perfect secret sharing schemes, (LNCS-Lecture Notes in Computer Science 1361) Hal 207-216 |
Author: Pascal Paillier; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 167-182 |
Author: Dae Hyun Yum and Pil Joong Lee; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A type-2 fuzzy control traffic policing mechanism schemes model over high speed network using backpressure technique, 1-5 |
Author: Somchai Lekcharoen; | Call Number: SEM-349 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Improved Logistic-Sine Chaotic Map based S-box and Bit-Plane Scrambling Encryption Schemes Performance on Compressed ECG Data |
Author: Muhammad Fauzi; Grafika Jati
Muchammad Febrian Rachmadi; | Call Number: Mak T Jilid 071-095 (T-1283) (Mak T-082) | Type: Makalah Tesis
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A system on chip for power line communications according to european home systems specifications, (LNCS-Lecture Notes in Computer Science 2147) Hal 658-662 |
Author: Isidoro Urriza; Jose I. Garcia-Nicolas; Alfredo Sanz; Antonio Valdovinos; | Call Number: 005.115 Fie | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Approximation Algorithms: Greedy Facility Location Algorithms Analyzed Using Dual Fitting with Factor-Revealing LP |
Author: K. Jain, [et all] | Type: Indeks Artikel Jurnal
|
Find Similar |
Add To Favorites |
Detail in New Window
|