Search

Your search keyword '"010201 computation theory & mathematics"' showing total 206 results

Search Constraints

Start Over You searched for: Descriptor "010201 computation theory & mathematics" Remove constraint Descriptor: "010201 computation theory & mathematics" Topic computer science Remove constraint Topic: computer science Journal the computer journal Remove constraint Journal: the computer journal
206 results on '"010201 computation theory & mathematics"'

Search Results

1. On the g-Extra Connectivity of the Enhanced Hypercubes

2. Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC

3. A Refinement of Key Mismatch Attack on NewHope

4. Cryptanalysis of Modular Exponentiation Outsourcing Protocols

5. Efficient Multi-Signature Scheme Using Lattice

6. A New and Efficient Lattice-Based Online/Offline Signature From Perspective of Abort

7. MBSO Algorithm For Handling Energy-Throughput Trade-Off In Cognitive Radio Networks

8. Guess-and-Determine Attacks on AEGIS

9. Observations on the Security of COMET

10. Toward Both Privacy and Efficiency of Homomorphic MACs for Polynomial Functions and Its Applications

11. The Reliability of k-Ary n-Cube Based on Component Connectivity

12. On the Hardness of Sparsely Learning Parity with Noise

13. The Matching Preclusion of Enhanced Hypercubes

14. The (Im)Possibility on Constructing Verifiable Random Functions

15. Continuous Leakage-Amplified Public-Key Encryption With CCA Security

16. Deep Multi-Stage Approach For Emotional Body Gesture Recognition In Job Interview

17. A New Code-Based Blind Signature Scheme

18. Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9

19. CMT: An Efficient Algorithm for Scalable Packet Classification

20. NP-LFA: Non-profiled Leakage Fingerprint Attacks against Improved Rotating S-box Masking Scheme

21. Forward-Secure Edge Authentication for Graphs

22. Compression with Wildcards: From CNFs to Orthogonal DNFs by Imposing the Clauses One-by-One

23. Binary Tree Encryption with Constant-Size Public Key in the Standard Model

24. New Division Property Propagation Table: Applications to Block Ciphers with Large S-boxes

25. Continual Leakage-Resilient Hedged Public-Key Encryption

26. Sensitivity Analysis of Conflicting Goals in the i* Goal Model

27. A Divide & Conquer Approach to Leads-to Model Checking

28. Unlinkable and Revocable Secret Handshake

29. A Verifier-Based Password-Authenticated Key Exchange Using Tamper-Proof Hardware

30. Watson–Crick Jumping Finite Automata: Combination, Comparison and Closure

31. Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory

32. Salient Object Detection Based on Multiscale Segmentation and Fuzzy Broad Learning

33. Improved Key Recovery Attacks on Simplified Version of K2 Stream Cipher

34. Detecting Spam Product Reviews in Roman Urdu Script

35. The Component Diagnosability of Hypercubes with Large-Scale Faulty Nodes

36. Real-World Networks Are Not Always Fast Mixing

37. CCA-Almost-Full Anonymous Group Signature with Verifier Local Revocation in the Standard Model

38. Lightweight Public Key Encryption With Equality Test Supporting Partial Authorization in Cloud Storage

39. Fully Retroactive Minimum Spanning Tree Problem

40. Robust Detection of Copy-Move Forgery Based on Wavelet Decomposition and Firefly Algorithm

41. Text Summarization as a Multi-objective Optimization Task: Applying Harmony Search to Extractive Multi-Document Summarization

42. CyberEyes: Cybersecurity Entity Recognition Model Based on Graph Convolutional Network

43. Linearly Homomorphic Signatures from Lattices

44. Weakly Supervised Sentiment-Specific Region Discovery for VSA

45. Private Set Operations Over Encrypted Cloud Dataset and Applications

46. Novel Public-Key Encryption with Continuous Leakage Amplification

47. Efficient Group ID-Based Encryption With Equality Test Against Insider Attack

48. The Conditional Reliability Evaluation of Data Center Network BCDC

49. A Machine Learning-Based Model to Evaluate Readability and Assess Grade Level for the Web Pages

50. A Cotton Disease Diagnosis Method Using a Combined Algorithm of Case-Based Reasoning and Fuzzy Logic

Catalog

Books, media, physical & digital resources