Your search for 38157 returns 6414 document(s) |
Error control scheme of hybrid ARQ based on majority voting bit by bit, (LNCS-Lecture Notes in Computer Science 5576) Hal. 563-569 |
Author: Hsin-Kun Lai, Chia-Chin Ma, Eri-Huel Lu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Safety high accuracy context-aware matrix (CAM) making based on X.509 proxy certificate, (LNCS-Lecture Notes in Computer Science 5576)Hal 829-837 |
Author: Hoon Ko; Ning Chen; Goreti Marreiros; Carlos Ramos; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Optimal quantization and energy allocation schemes in distributed estimation for wireles sensor networks, Hal. 57-61 |
Author: Eni Dwi Wardihani, Wirawan, Gamantyo Hendrantoro; | Call Number: SEM-301 | Type: Indeks Artikel prosiding/Sem
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Equivocable and extractable commitment schemes, (LNCS-Lecture Notes in Computer Science 2576) Hal 74-87 |
Author: Giovanni Di Crescenzo; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secret sharing schemes on access structures with intersection number equal to one (LNCS-Lecture Notes in Computer Science 2576) 354 |
Author: Jaume Marti-Farre; Carles Padro; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122 |
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Receipt-free electronic voting schemes for large scale elections,(LNCS-Lecture Notes in Computer Science 1361) Hal 25-35 |
Author: Tatsuaki Okamoto; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On signature schemes with threshold verification detecting malicious verifiers, (LNCS-Lecture Notes in Computer Science 1361) Hal 67-78 |
Author: Holger Petersen; Markus Michels; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On ideal non-perfect secret sharing schemes, (LNCS-Lecture Notes in Computer Science 1361) Hal 207-216 |
Author: Pascal Paillier; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Interval analysis in scheduling, (LNCS-Lecture Notes in Computer Science 3709) Hal 226-240 |
Author: Jerome Fortin; Pawel Zielinski; Didier Dubois; Helene Fargier; | Call Number: 005.133 Bee P | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|