Works matching DE "CHINESE remainder theorem"
1
- Applied Sciences (2076-3417), 2025, v. 15, n. 10, p. 5771, doi. 10.3390/app15105771
- Zhou, Liang;
- Huang, Ruwei;
- Wang, Bingbing
- Article
2
- Wireless Personal Communications, 2024, v. 137, n. 3, p. 1663, doi. 10.1007/s11277-024-11416-5
- Deshmukh, Maroti;
- Bisht, Kanchan;
- Rawat, Arjun Singh
- Article
3
- Measurement Techniques, 2019, v. 62, n. 7, p. 608, doi. 10.1007/s11018-019-01667-1
- Article
4
- Automation & Remote Control, 2005, v. 66, n. 7, p. 1081, doi. 10.1007/s10513-005-0150-x
- Article
5
- Advances in Systems Science & Applications, 2023, v. 23, n. 4, p. 31
- Kuchukov, Viktor;
- Babenko, Mikhail;
- Al-Galda, Safwat
- Article
6
- Palestine Journal of Mathematics, 2024, v. 13, p. 1
- Kauers, Manuel;
- Pilz, Günter
- Article
7
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2024, v. 14, n. 4, p. 324, doi. 10.15276/imms.v14.no4.324
- Article
8
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2024, v. 14, n. 4, p. 305, doi. 10.15276/imms.v14.no4.305
- Yakymenko, I.;
- Kasianchuk, M.;
- Shylinska, I.
- Article
9
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2022, v. 12, n. 4, p. 337, doi. 10.15276/imms.v12.no4.337
- Article
10
- Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì, 2021, v. 11, n. 1/2, p. 47, doi. 10.15276/imms.v11.no1-2.47
- Касянчук, М. М.;
- Лотоцький, О. Я.;
- Яцків, С. В.;
- Івасьєв, С. В.;
- Тимошенко, Л. М.
- Article
11
- European Physical Journal D (EPJ D), 2021, v. 75, n. 1, p. 1, doi. 10.1140/epjd/s10053-020-00014-2
- Shi, Run-hua;
- Qin, Jia-qi;
- Liu, Bai;
- Zhang, Mingwu
- Article
12
- Security & Communication Networks, 2023, p. 1, doi. 10.1155/2023/6693296
- Song, Zichao;
- Zhong, Weidong;
- Zhou, Tanping;
- Chen, Dong;
- Ding, Yujie;
- Yang, Xiaoyuan
- Article
13
- Security & Communication Networks, 2022, v. 2022, p. 1, doi. 10.1155/2022/2734487
- Zhu, Qing;
- Lin, Huijie;
- Wan, Changsheng;
- Xie, Yuan;
- Peng, Shaowu
- Article
14
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/8380239
- Du, Weidong;
- Li, Min;
- Han, Yiliang;
- Wang, Xu An;
- Wei, Zhaoying
- Article
15
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/7864235
- Hu, Fei;
- Yao, Yuanzhi;
- Li, Weihai;
- Yu, Nenghai
- Article
16
- Information (2078-2489), 2019, v. 10, n. 2, p. 75, doi. 10.3390/info10020075
- Ping, Yuan;
- Wang, Baocang;
- Tian, Shengli;
- Zhou, Jingxian;
- Ma, Hui
- Article
17
- Peer-to-Peer Networking & Applications, 2024, v. 17, n. 4, p. 2397, doi. 10.1007/s12083-024-01699-7
- Goswami, Chandan;
- Adhikari, Avishek;
- Sahoo, Suraj Kumar;
- Sarkar, Pinaki
- Article
18
- Peer-to-Peer Networking & Applications, 2023, v. 16, n. 1, p. 260, doi. 10.1007/s12083-022-01391-8
- Tyagi, Gaurav;
- Kumar, Rahul
- Article
19
- Peer-to-Peer Networking & Applications, 2020, v. 13, n. 3, p. 1002, doi. 10.1007/s12083-019-00849-6
- Hu, Peng;
- Wang, Yongli;
- Gong, Bei;
- Wang, Yongjian;
- Li, Yanchao;
- Zhao, Ruxin;
- Li, Hao;
- Li, Bo
- Article
20
- Resonance: Journal of Science Education, 2015, v. 20, n. 3, p. 206, doi. 10.1007/s12045-015-0171-x
- Article
21
- Mathematical Notes, 2006, v. 80, n. 1/2, p. 72, doi. 10.1007/s11006-006-0110-y
- Article
22
- Journal of South China Normal University (Natural Science Edition) / Huanan Shifan Daxue Xuebao (Ziran Kexue Ban), 2023, v. 55, n. 2, p. 124, doi. 10.6054/j.jscnun.2023028
- Article
23
- International Journal of Mathematical Education in Science & Technology, 2000, v. 31, n. 3, p. 476, doi. 10.1080/00207390050032351
- Harger, Robert T.;
- Smith, Rebecca M.
- Article
24
- Journal of the Korea Institute of Information & Communication Engineering, 2023, v. 27, n. 3, p. 405, doi. 10.6109/jkiice.2023.27.3.405
- Article
25
- International Journal of Information Security Science, 2019, v. 8, n. 2, p. 17
- Ersoy, Oğuzhan;
- Kaya, Kamer;
- Kaşkaloğlu, Kerem
- Article
26
- International Journal of Distributed Sensor Networks, 2017, v. 13, n. 10, p. 1, doi. 10.1177/1550147717736026
- Lee, Woosik;
- Song, Teukseob
- Article
27
- Southeast Asian Bulletin of Mathematics, 2008, v. 32, n. 3, p. 417
- Deore, R. P.;
- Patti, K. B.
- Article
28
- Neural Computing & Applications, 2025, v. 37, n. 16, p. 10351, doi. 10.1007/s00521-025-11099-4
- Khan, Sangeen;
- Qiming, Huang
- Article
29
- International Journal of Performability Engineering, 2020, v. 16, n. 4, p. 647, doi. 10.23940/ijpe.20.04.p16.647655
- Yang Wang;
- Deyun Chen;
- Jinkai Xie;
- Jiahao Zhu;
- Guangyue Zhang
- Article
30
- International Journal of Theoretical Physics, 2013, v. 52, n. 2, p. 539, doi. 10.1007/s10773-012-1358-5
- Shi, Ronghua;
- Lv, Geli;
- Wang, Yuan;
- Huang, Dazu;
- Guo, Ying
- Article
31
- Results in Mathematics / Resultate der Mathematik, 2024, v. 79, n. 2, p. 1, doi. 10.1007/s00025-023-02119-7
- Article
32
- Computer Systems Science & Engineering, 2021, v. 36, n. 2, p. 417, doi. 10.32604/csse.2021.014460
- Wunan Wan;
- Jun Chen;
- Jinyue Xia;
- Jinquan Zhang;
- Shibin Zhang;
- Hao Chen
- Article
33
- Multimedia Tools & Applications, 2022, v. 81, n. 25, p. 36735, doi. 10.1007/s11042-022-13501-y
- Patel, Neeraj;
- Kumar, Vinod
- Article
34
- Multimedia Tools & Applications, 2022, v. 81, n. 16, p. 21995, doi. 10.1007/s11042-022-13261-9
- Khare, Manish;
- Khare, Ashish;
- Jeon, Moongu;
- Sethi, Ishwar K.
- Article
35
- Multimedia Tools & Applications, 2022, v. 81, n. 16, p. 22027, doi. 10.1007/s11042-021-11284-2
- Article
36
- Multimedia Tools & Applications, 2022, v. 81, n. 10, p. 14403, doi. 10.1007/s11042-022-12043-7
- Hariss, Khalil;
- Noura, Hassan
- Article
37
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 4, p. 282, doi. 10.1049/ise2.12014
- Ţiplea, Ferucio Laurenţiu;
- Drăgan, Constantin Cătălin
- Article
38
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 3, p. 278, doi. 10.1049/iet-ifs.2018.5174
- Sheikhi‐Garjan, Maryam;
- Bahramian, Mojtaba;
- Doche, Christophe
- Article
39
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 1, p. 25, doi. 10.1049/iet-ifs.2016.0508
- Mahanta, Hridoy Jyoti;
- Khan, Ajoy Kumar
- Article
40
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 179, doi. 10.1049/iet-ifs.2012.0352
- Vijayakumar, Pandi;
- Bose, Sudan;
- Kannan, Arputharaj
- Article
41
- JSIAM Letters (Online), 2024, v. 16, p. 97, doi. 10.14495/jsiaml.16.97
- Genki Akimoto;
- Tsuyoshi Takagi
- Article
42
- Defence Technology, 2024, v. 31, p. 523, doi. 10.1016/j.dt.2022.12.016
- Kai-lun Tian;
- Kai-li Jiang;
- Sen Cao;
- Jian Gao;
- Ying Xiong;
- Bin Tang;
- Xu-ying Zhang;
- Yan-fei Li
- Article
43
- Malaysian Journal of Mathematical Sciences, 2016, v. 10, p. 1
- Asbullah, Muhammad Asyraf;
- Ariffin, Muhammad Rezal Kamel
- Article
44
- Axioms (2075-1680), 2022, v. 11, n. 1, p. 5, doi. 10.3390/axioms11010005
- Sabbagh Molahosseini, Amir
- Article
45
- Ada User Journal, 2020, v. 41, n. 4, p. 195
- Article
46
- Neural Network World, 2020, n. 3, p. 177, doi. 10.14311/NNW.2020.30.013
- Naseem, M. T.;
- Qureshiy, I. M.;
- Atta-ur-Rahman;
- Muzaffar, M. Z.
- Article
47
- Telecommunication Systems, 2024, v. 86, n. 1, p. 83, doi. 10.1007/s11235-024-01110-z
- Abudaqa, Anas A.;
- Mahmoud, Ashraf S. H.;
- ALsaggaf, Alawi A.;
- Sheltami, Tarek R.
- Article
48
- Telecommunication Systems, 2021, v. 78, n. 1, p. 49, doi. 10.1007/s11235-021-00791-0
- Li, Xiaoping;
- Chang, Ching-Chun;
- Liu, Yanjun
- Article
49
- Telecommunication Systems, 2017, v. 64, n. 1, p. 147, doi. 10.1007/s11235-016-0166-2
- Trifina, Lucian;
- Tarniceriu, Daniela
- Article
50
- ISeCure, 2023, v. 15, n. 1, p. 125, doi. 10.22042/isecure.2022.293948.689
- Kiasari, Mohammad Ebrahim Ebrahimi;
- Pakniat, Nasrollah;
- Mirghadri, Abdolrasoul;
- Nazari, Mojtaba
- Article