by
Csiszár, Imre. editor.
Format:
Electronic Resources
Excerpt:
Two-Stage Group Testing with Error-Correcting d e-Disjunct Inclusion Matrices -- Model Identification Using
by
Nguyen, Phong Q. editor.
Format:
Electronic Resources
Excerpt:
Provably Secure Group Key Agreement Building on Group Theory -- Public-Key Encryption -- Universally
View Other Search Results
by
Brandes, Ulrik. editor.
Format:
Electronic Resources
Excerpt:
models. From a computer science perspective, network analysis is applied graph theory. Unlike standard
by
Devitt, Simon. editor.
Format:
Electronic Resources
Excerpt:
-- Circuit Theory -- Application of Permutation Group Theory in Reversible Logic Synthesis -- Strongly
by
Cramer, Ronald. editor.
Format:
Electronic Resources
Excerpt:
Identification Schemes Secure Under Active Attacks -- Efficient Simultaneous Broadcast -- SAS-Based Group
by
Bosma, Wieb. editor.
Format:
Electronic Resources
Excerpt:
representation theory and group theory to some branches of discrete mathematics and graph theory. A basic
by
Coppo, Mario. editor.
Format:
Electronic Resources
Excerpt:
Approximability Results -- Quantum Algorithms for a Set of Group Theoretic Problems -- On the Computational
by
Roli, Fabio. editor.
Format:
Electronic Resources
Excerpt:
organized every two years by the Italian group of researchersa?liated to the International Association for
by
Pieprzyk, Josef. editor.
Format:
Electronic Resources
Excerpt:
-- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures -- Hash-and-Sign with Weak
by
Fraigniaud, Pierre. editor.
Format:
Electronic Resources
Excerpt:
Self-organization -- Timing Games and Shared Memory -- A Lightweight Group Mutual k-Exclusion Algorithm Using
by
Dehne, Frank. editor.
Format:
Electronic Resources
Excerpt:
Ratio Trees Revisited -- Session 3B -- Improved Combinatorial Group Testing for Real-World Problem Sizes
by
Roy, Bimal. editor.
Format:
Electronic Resources
Excerpt:
Proof Models for Key Establishment Protocols -- Provable Security -- Server-Aided Verification: Theory
Limit Search Results
Narrowed by: