Found: 16
Select item for more details and to access through your institution.
Improving fairness in peer-to-peer networks by separating the role of seeders in network infrastructures.
- Published in:
- Turkish Journal of Electrical Engineering & Computer Sciences, 2016, v. 24, n. 4, p. 2255, doi. 10.3906/elk-1402-304
- By:
- Publication type:
- Article
A Stable Clustering Scheme Based on Adaptive Multiple Metric in Vehicular Ad-hoc Networks.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 2, p. 361
- By:
- Publication type:
- Article
A Provably Secure Variant of ETRU Based on Extended Ideal Lattices Over Direct Product of Dedekind Domains.
- Published in:
- Journal of Computing & Security, 2018, v. 5, n. 1, p. 13, doi. 10.22108/jcs.2018.106856.0
- By:
- Publication type:
- Article
Generalizations of Prime Ideals of Semirings.
- Published in:
- Azerbaijan Journal of Mathematics, 2013, v. 3, n. 1, p. 76
- By:
- Publication type:
- Article
A New Ring-Based SPHF and PAKE Protocol on Ideal Lattices.
- Published in:
- ISeCure, 2019, v. 11, n. 1, p. 75
- By:
- Publication type:
- Article
NETRU: A Non-commutative and Secure Variant of CTRU Cryptosystem.
- Published in:
- ISeCure, 2018, v. 10, n. 1, p. 45
- By:
- Publication type:
- Article
EEH:AGGH-Like Public Key Cryptosystem Over The Eisenstein Integers Using Polynomial Representations.
- Published in:
- ISeCure, 2015, v. 7, n. 2, p. 1
- By:
- Publication type:
- Article
A survey of IT early warning systems: architectures, challenges, and solutions.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4751, doi. 10.1002/sec.1647
- By:
- Publication type:
- Article
On detecting unidentified network traffic using pattern-based random walk.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 16, p. 3509, doi. 10.1002/sec.1557
- By:
- Publication type:
- Article
Privacy enhancement in anonymous network channels using multimodality injection.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 16, p. 2917, doi. 10.1002/sec.1219
- By:
- Publication type:
- Article
Advances In Mobile Voting.
- Published in:
- International Journal of Advanced Research in Computer Science, 2012, v. 3, n. 5, p. 127
- By:
- Publication type:
- Article
Graded multiplication modules and the graded ideal θ<sub>g</sub>(M).
- Published in:
- Turkish Journal of Mathematics, 2011, v. 35, n. 1, p. 1, doi. 10.3906/mat-0901-22
- By:
- Publication type:
- Article
A new public key cryptography using M<sub>q</sub> matrix.
- Published in:
- Journal of Mathematical Modeling (JMM), 2023, v. 11, n. 4, p. 681, doi. 10.22124/JMM.2023.23982.2142
- By:
- Publication type:
- Article
PairTRU: Pairwise Non-commutative Extension of The NTRU Public key Cryptosystem.
- Published in:
- International Journal of Information Security Science, 2018, v. 7, n. 1, p. 11
- By:
- Publication type:
- Article
On DPA-Resistive Implementation of FSR-based Stream Ciphers using SABL Logic Styles.
- Published in:
- International Journal of Computers, Communications & Control, 2008, v. 3, n. 4, p. 324, doi. 10.15837/ijccc.2008.4.2400
- By:
- Publication type:
- Article
A Zariski Topology For Semimodules.
- Published in:
- European Journal of Pure & Applied Mathematics, 2011, v. 4, n. 3, p. 251
- By:
- Publication type:
- Article