Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: Mathematical and Computer Modelling
    Year: 2012
    Volume: 55
    Number: 1
    DBLP: db/journals/mcm/mcm55.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 200  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    R. Padmavathy, Chakravarthy Bhagvati.
    Discrete logarithm problem using index calculus method.
    Mathematical and Computer Modelling 2012, Volume 55 (0) 2012
    Journal article
    Bart Preneel, Jongsung Kim, Damien Sauveron.
    Advanced theory and practice for cryptography and future security.
    Mathematical and Computer Modelling 2012, Volume 55 (0) 2012
    Journal article
    Shaojing Fu, Chao Li, Longjiang Qu, Deshuai Dong.
    On the number of rotation symmetric functions over GF(p).
    Mathematical and Computer Modelling 2012, Volume 55 (0) 2012
    Journal article
    Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong.
    Differential fault analysis on block cipher SEED.
    Mathematical and Computer Modelling 2012, Volume 55 (0) 2012
    Journal article
    Chun-Ta Li, Cheng-Chi Lee.
    A novel user authentication and privacy preserving scheme with smart cards for wireless communications.
    Mathematical and Computer Modelling 2012, Volume 55 (0) 2012
    Journal article
    Inyong Lee, Soonki Jeong, Sangsoo Yeo, Jongsub Moon.
    A novel method for SQL injection attack detection based on removing SQL query attribute values.
    Mathematical and Computer Modelling 2012, Volume 55 (0) 2012
    Journal article
    Nianhua Yang, Huiqun Yu, Zhilin Qian, Hua Sun.
    Modeling and quantitatively predicting software security based on stochastic Petri nets.
    Mathematical and Computer Modelling 2012, Volume 55 (0) 2012
    Journal article
    Kyung-Soo Lim, Antonio Savoldi, Changhoon Lee, Sangjin Lee.
    On-the-spot digital investigation by means of LDFS: Live Data Forensic System.
    Mathematical and Computer Modelling 2012, Volume 55 (0) 2012
    Journal article
    JingZheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao.
    Improving performance of network covert timing channel through Huffman coding.
    Mathematical and Computer Modelling 2012, Volume 55 (0) 2012
    Journal article
    Xiaopu Ma, Ruixuan Li, Zhengding Lu, Wei Wang.
    Mining constraints in role-based access control.
    Mathematical and Computer Modelling 2012, Volume 55 (0) 2012
    Show item 1 to 10 of 200  

    Your query returned 200 matches in the database.