nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A conditional access system with revocation for mobile pay-TV systems revisited
|
Rial, Alfredo |
|
2019 |
147 |
C |
p. 6-9 |
artikel |
2 |
A new matrix form to generate all 3 × 3 involutory MDS matrices over F 2 m
|
Güzel, Gülsüm Gözde |
|
2019 |
147 |
C |
p. 61-68 |
artikel |
3 |
Comments on “Proportionate flowshops with general position dependent processing times” [Inf. Process. Lett. 111 (2011) 174–177] and “Minimizing total load on a proportionate flowshop with position-dependent processing times and job-rejection” [Inf. Process. Lett. 132 (2018) 39–43]
|
Kovalyov, Mikhail Y. |
|
2019 |
147 |
C |
p. 1-2 |
artikel |
4 |
Constructing a binary tree from its traversals by reversible recursion and iteration
|
Glück, Robert |
|
2019 |
147 |
C |
p. 32-37 |
artikel |
5 |
CuCoTrack: Cuckoo filter based connection tracking
|
Reviriego, Pedro |
|
2019 |
147 |
C |
p. 55-60 |
artikel |
6 |
Dynamic threshold based information leaker identification scheme
|
Gupta, Ishu |
|
2019 |
147 |
C |
p. 69-73 |
artikel |
7 |
Editorial Board
|
|
|
2019 |
147 |
C |
p. ii |
artikel |
8 |
Efficient pattern matching in degenerate strings with the Burrows–Wheeler transform
|
Daykin, J.W. |
|
2019 |
147 |
C |
p. 82-87 |
artikel |
9 |
Faster parameterized algorithm for pumpkin vertex deletion set
|
Tsur, Dekel |
|
2019 |
147 |
C |
p. 74-76 |
artikel |
10 |
Improved Zhang neural network with finite-time convergence for time-varying linear system of equations solving
|
Lv, Xuanjiao |
|
2019 |
147 |
C |
p. 88-93 |
artikel |
11 |
Key regression from constrained pseudorandom functions
|
Kissel, Zachary A. |
|
2019 |
147 |
C |
p. 10-13 |
artikel |
12 |
On one-round reliable message transmission
|
Bødker Christensen, René |
|
2019 |
147 |
C |
p. 22-26 |
artikel |
13 |
On the hardness of deciding the equality of the induced and the uniquely restricted matching number
|
Fürst, M. |
|
2019 |
147 |
C |
p. 77-81 |
artikel |
14 |
Relationship between optimal k-distance dominating sets in a weighted graph and its spanning trees
|
Sukhamay, Kundu |
|
2019 |
147 |
C |
p. 3-5 |
artikel |
15 |
Reverse auctions are different from auctions
|
Gerstgrasser, Matthias |
|
2019 |
147 |
C |
p. 49-54 |
artikel |
16 |
Secondary constructions of RSBFs with good cryptographic properties
|
Sun, Lei |
|
2019 |
147 |
C |
p. 44-48 |
artikel |
17 |
Security analysis of SIMECK block cipher against related-key impossible differential
|
Sadeghi, Sadegh |
|
2019 |
147 |
C |
p. 14-21 |
artikel |
18 |
Self-stabilizing algorithm for two disjoint minimal dominating sets
|
Srimani, Pradip K. |
|
2019 |
147 |
C |
p. 38-43 |
artikel |
19 |
Size-optimal top dag compression
|
Lohrey, Markus |
|
2019 |
147 |
C |
p. 27-31 |
artikel |