Your search for 38524 returns 2457 document(s) |
Combining constraint solving and symbolic model checking for a class of systems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254) Hal 316-327 |
Author: William Chan; Richard Anderson; Paul Beame; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An improved reachability analysis method for strongly linear hybrid systems (extended abstract),(LNCS-Lecture Notes in Computer Science 1254) Hal 167-178 |
Author: Bernard Boigelot; Louis Bronne; Stephane Rassart; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Combining constraint solving and symbolic model checking for a class of sysems with non-linear constraints, (LNCS-Lecture Notes in Computer Science 1254)Hal. 316-327 |
Author: William Chan; Richard Anderson; Paul Beanne; David Notkin; | Call Number: 004 Int c | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of idea-x/2, (LNCS-Lecture Notes in Computer Science 2887) Hal 1-8 |
Author: Havard Raddum; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On plateaued functions and their constructions, (LNCS-Lecture Notes in Computer Science 2887) Hal 54-73 |
Author: Claude Carlet; Emmanuel Prouff; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Loosening the knot, (LNCS-Lecture Notes in Computer Science 2887) Hal 87-99 |
Author: Antoine Joux; Frederic the Knot; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the resynchronization attack, (LNCS-Lecture Notes in Computer Science 2887) Hal 100-110 |
Author: Jovan Dj. Golic; Guglielmo Morgari; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Cryptanalysis of sober-t32, (LNCS-Lecture Notes in Computer Science 2887) Hal 111-128 |
Author: Steve Babbage; Christophe De Canniere; Joseph Lano; Bart Preneel; Joos Vandewalle; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Analysis of rmac, (LNCS-Lecture Notes in Computer Science 2887) Hal 182-191 |
Author: Lars R. Knudsen; Tadayoshi Kohno; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Multy-party Computation from any linear secret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-15 |
Author: Ventzislav Nikov; Svetla Nikova; Bart Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|