Works matching DE "SET (Computer network protocol)"


Results: 83
    1
    2
    3
    4
    5
    6
    7
    8
    9

    Secure Computation Without Authentication.

    Published in:
    Journal of Cryptology, 2011, v. 24, n. 4, p. 720, doi. 10.1007/s00145-010-9075-9
    By:
    • Barak, Boaz;
    • Canetti, Ran;
    • Lindell, Yehuda;
    • Pass, Rafael;
    • Rabin, Tal
    Publication type:
    Article
    10
    11
    12
    13
    14
    15
    16
    17

    FUNDAMENTAL LAW NETWORK.

    Published in:
    Journal of Applied Global Research, 2011, v. 4, n. 11, p. 44
    By:
    • Williams, O. D.
    Publication type:
    Article
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29

    Set containment join revisited.

    Published in:
    Knowledge & Information Systems, 2016, v. 49, n. 1, p. 375, doi. 10.1007/s10115-015-0895-7
    By:
    • Bouros, Panagiotis;
    • Mamoulis, Nikos;
    • Ge, Shen;
    • Terrovitis, Manolis
    Publication type:
    Article
    30
    31
    32
    33
    34
    35
    36
    37

    Sequential Diagnosis by Abstraction.

    Published in:
    Journal of Artificial Intelligence Research, 2011, v. 41, p. 329, doi. 10.1613/jair.3296
    By:
    • Siddiqi, Sajjad;
    • Jinbo Huang
    Publication type:
    Article
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50