Search Result Save to File Save as CSV
Your search for 38524 returns 2457 document(s)
Combining constraint solving and symbolic model checking for a class of systems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254) Hal 316-327
Author: William Chan; Richard Anderson; Paul Beame; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
An improved reachability analysis method for strongly linear hybrid systems (extended abstract),(LNCS-Lecture Notes in Computer Science 1254) Hal 167-178
Author: Bernard Boigelot; Louis Bronne; Stephane Rassart; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Combining constraint solving and symbolic model checking for a class of sysems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254)Hal. 316-327
Author: William Chan; Richard Anderson; Paul Beanne; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of idea-x/2, (LNCS-Lecture Notes in Computer Science 2887) Hal 1-8
Author: Havard Raddum; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On plateaued functions and their constructions, (LNCS-Lecture Notes in Computer Science 2887) Hal 54-73
Author: Claude Carlet; Emmanuel Prouff; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Loosening the knot, (LNCS-Lecture Notes in Computer Science 2887) Hal 87-99
Author: Antoine Joux; Frederic the Knot; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the resynchronization attack, (LNCS-Lecture Notes in Computer Science 2887) Hal 100-110
Author: Jovan Dj. Golic; Guglielmo Morgari; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of sober-t32, (LNCS-Lecture Notes in Computer Science 2887) Hal 111-128
Author: Steve Babbage; Christophe De Canniere; Joseph Lano; Bart Preneel; Joos Vandewalle; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of rmac, (LNCS-Lecture Notes in Computer Science 2887) Hal 182-191
Author: Lars R. Knudsen; Tadayoshi Kohno; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Multy-party Computation from any linear secret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-15
Author: Ventzislav Nikov; Svetla Nikova; Bart Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next