Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             25 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A class of rotation symmetric Boolean functions with optimum algebraic immunity Li, Chunlei
2008
13 6 p. 702-706
artikel
2 A deniable authenticated key agreement protocol Tian, Haibo
2008
13 6 p. 645-650
artikel
3 A general pairwise key predistribution scheme for wireless sensor networks Ding, Xiaoyu
2008
13 6 p. 744-748
artikel
4 A geometric robust watermarking algorithm based on DWT-DCT and Zernike moments Chen, Yu
2008
13 6 p. 753-758
artikel
5 A group-oriented (t,n) threshold signature scheme with traceable signers Tan, Zuowen
2008
13 6 p. 680-684
artikel
6 Analysis of the design methods of word oriented linear feedback shift registers Zeng, Guang
2008
13 6 p. 712-716
artikel
7 An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis Chen, Jia
2008
13 6 p. 697-701
artikel
8 An efficient identity-based anonymous signcryption scheme Yu, Yong
2008
13 6 p. 670-674
artikel
9 A new certificateless public key encryption scheme Chen, Yan
2008
13 6 p. 721-726
artikel
10 A new efficient blind signcryption Yu, Xiuying
2008
13 6 p. 662-664
artikel
11 A new secure password authentication scheme using smart cards Wang, Bangju
2008
13 6 p. 739-743
artikel
12 An improved sanitizable signature scheme Wang, Shangping
2008
13 6 p. 675-679
artikel
13 A practical identity-based signature scheme Li, Chenghua
2008
13 6 p. 692-696
artikel
14 Authenticated Diffie-Hellman key agreement protocol with forward secrecy Zhang, Chuanrong
2008
13 6 p. 641-644
artikel
15 Cycling attacks against homomorphic cryptosystems Wang, Lin
2008
13 6 p. 727-732
artikel
16 Efficient hierarchical identity based signature scheme in the standard model Ren, Yanli
2008
13 6 p. 665-669
artikel
17 Efficient privacy enhanced software registration with ID-based blind signatures Chen, Wuping
2008
13 6 p. 733-738
artikel
18 Efficient scalar multiplication for elliptic curves over binary fields Gu, Haihua
2008
13 6 p. 717-720
artikel
19 Instantiate random oracles in OAEP with pseudorandom functions Jia, Xiaoying
2008
13 6 p. 651-656
artikel
20 On the largest linear span of binary sequences with period p2 from interleaved construction Li, Shenghua
2008
13 6 p. 707-711
artikel
21 Research on transferable off-line electronic cash system Liu, Yichun
2008
13 6 p. 749-752
artikel
22 Secure proxy re-encryption from CBE to IBE Chen, Yan
2008
13 6 p. 657-661
artikel
23 The multireceiver commitment schemes Wang, Shuhong
2008
13 6 p. 759-764
artikel
24 Trust calculation and delivery control in trust-based access control Lei, Jianyun
2008
13 6 p. 765-768
artikel
25 Universal designated multi verifier signature scheme without random oracles Ming, Yang
2008
13 6 p. 685-691
artikel
                             25 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland