Works matching DE "CIPHERS"
1
- International Journal of Circuit Theory & Applications, 2025, v. 53, n. 5, p. 2968, doi. 10.1002/cta.4272
- Chen, Wen;
- Liu, Wenfen;
- Guo, Ying;
- Yu, Bin;
- Liu, Yusheng
- Article
2
- International Journal of Legal Information, 2023, v. 51, n. 3, p. 82, doi. 10.1017/jli.2022.31
- Article
3
- Technical Communication, 2010, v. 57, n. 1, p. 26
- Article
4
- Strategic Management Journal (Wiley-Blackwell) - 1980 to 2009, 2007, v. 28, n. 5, p. 455, doi. 10.1002/smj.583
- Durand, Rodolphe;
- Rao, Hayagreeva;
- Monin, Philippe
- Article
5
- Documentation & Bibliotheques, 2011, v. 57, n. 1, p. 33, doi. 10.7202/1028963ar
- Article
6
- Documentation & Bibliotheques, 2008, v. 54, n. 4, p. 257, doi. 10.7202/1029188ar
- Article
7
- Qualitative Inquiry, 2010, v. 16, n. 7, p. 531, doi. 10.1177/1077800410371921
- Article
8
- Psychological Reports, 2021, v. 124, n. 2, p. 438, doi. 10.1177/0033294119892880
- Canto-López, M. C.;
- Aguilar, M.;
- García-Sedeño, M. A.;
- Navarro, J. I.;
- Aragón, E.;
- Delgado, C.;
- Mera, C.
- Article
9
- Psychological Reports, 2011, v. 109, n. 3, p. 718, doi. 10.2466/07.PR0.109.6.718-722
- King, Keith A.;
- Vidourek, Rebecca A.
- Article
11
- Patient Care (Print), 2003, v. 37, n. 6, p. 71
- Article
12
- Propellants, Explosives, Pyrotechnics, 2015, v. 40, n. 1, p. 150, doi. 10.1002/prep.201400038
- Keshavarz, Mohammad Hossein
- Article
13
- Propellants, Explosives, Pyrotechnics, 2014, v. 39, n. 1, p. 95, doi. 10.1002/prep.201300017
- Keshavarz, Mohammad Hossein;
- Motamedoshariati, Hadi;
- Moghayadnia, Reza;
- Ghanbarzadeh, Majid;
- Azarniamehraban, Jamshid
- Article
14
- Algebra Colloquium, 2020, v. 27, n. 2, p. 331, doi. 10.1142/S1005386720000279
- Leng, Jing;
- Guo, Yuqi;
- Shum, K.P.
- Article
15
- Algebra Colloquium, 2019, v. 26, n. 2, p. 181, doi. 10.1142/S1005386719000166
- Dinh, Hai Q.;
- Nguyen, Bac T.;
- Sriboonchitta, Songsak
- Article
16
- Structural & Multidisciplinary Optimization, 2020, v. 62, n. 4, p. 2211, doi. 10.1007/s00158-020-02629-w
- Ferrari, Federico;
- Sigmund, Ole
- Article
17
- Structural & Multidisciplinary Optimization, 2019, v. 59, n. 5, p. 1863, doi. 10.1007/s00158-018-2138-5
- Chen, Qi;
- Zhang, Xianmin;
- Zhu, Benliang
- Article
18
- Graphs & Combinatorics, 2019, v. 35, n. 3, p. 611, doi. 10.1007/s00373-019-02020-7
- Wang, Changyuan;
- Chang, Yanxun;
- Feng, Tao
- Article
19
- Graphs & Combinatorics, 2019, v. 35, n. 3, p. 633, doi. 10.1007/s00373-019-02019-0
- Key, J. D.;
- Rodrigues, B. G.
- Article
20
- Graphs & Combinatorics, 2019, v. 35, n. 3, p. 599, doi. 10.1007/s00373-019-02018-1
- Rahbani, Hadi;
- Rad, Nader Jafari;
- MirRezaei, Seyed Masoud
- Article
21
- Graphs & Combinatorics, 2017, v. 33, n. 3, p. 573, doi. 10.1007/s00373-017-1774-7
- Sabri, Ahmad;
- Vajnovszki, Vincent
- Article
22
- Political Analysis, 2008, v. 16, n. 4, p. 464, doi. 10.1093/pan/mpn008
- Article
23
- International Journal of Industrial Electronics Control & Optimization, 2024, v. 7, n. 1, p. 41
- Article
24
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 626, doi. 10.1049/ise2.12120
- Xu, Yanbin;
- Hao, Yonglin;
- Wang, Mingxing
- Article
25
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 4, p. 616, doi. 10.1049/ise2.12119
- Utsumi, Shion;
- Sakamoto, Kosei;
- Isobe, Takanori
- Article
26
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 347, doi. 10.1049/ise2.12099
- Lin, Dongdong;
- Li, Manman;
- Hou, Zezhou;
- Chen, Shaozhen
- Article
27
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 335, doi. 10.1049/ise2.12098
- Liu, Jiajie;
- Sun, Bing;
- Li, Chao
- Article
28
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 131, doi. 10.1049/ise2.12086
- Shiba, Rentaro;
- Anand, Ravi;
- Minematsu, Kazuhiko;
- Isobe, Takanori
- Article
29
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 6, p. 470, doi. 10.1049/ise2.12077
- Ranea, Adrián;
- Rijmen, Vincent
- Article
30
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 4, p. 282, doi. 10.1049/ise2.12061
- Lu, Jinyu;
- Liu, Yunwen;
- Ashur, Tomer;
- Sun, Bing;
- Li, Chao
- Article
31
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 6, p. 457, doi. 10.1049/ise2.12035
- Article
32
- IET Information Security (Wiley-Blackwell), 2021, v. 15, n. 5, p. 395, doi. 10.1049/ise2.12028
- Wang, Dachao;
- Wang, Baocang;
- Ping, Yuan
- Article
33
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 2, p. 202, doi. 10.1049/iet-ifs.2019.0326
- Dobraunig, Christoph;
- Moazami, Farokhlagha;
- Rechberger, Christian;
- Soleimany, Hadi
- Article
34
- IET Information Security (Wiley-Blackwell), 2020, v. 14, n. 1, p. 72, doi. 10.1049/iet-ifs.2018.5252
- Eskandari, Zahra;
- Ghaemi Bafghi, Abbas
- Article
35
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 6, p. 559, doi. 10.1049/iet-ifs.2018.5233
- Hodžić, Samir;
- Pasalic, Enes;
- Wei, Yongzhuang
- Article
36
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 448, doi. 10.1049/iet-ifs.2018.5201
- Arabnezhad‐Khanoki, Hossein;
- Sadeghiyan, Babak;
- Pieprzyk, Josef
- Article
37
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 411, doi. 10.1049/iet-ifs.2018.5357
- Jiao, Lin;
- Hao, Yonglin;
- Li, Yongqiang
- Article
38
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 4, p. 378, doi. 10.1049/iet-ifs.2018.5033
- Saha, Dhiman;
- Kakarla, Sourya;
- Roy Chowdhury, Dipanwita
- Article
39
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 3, p. 249, doi. 10.1049/iet-ifs.2018.5051
- Article
40
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 2, p. 125, doi. 10.1049/iet-ifs.2018.5291
- Article
41
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 6, p. 484, doi. 10.1049/iet-ifs.2017.0553
- Jiao, Lin;
- Li, Yongqiang;
- Hao, Yonglin
- Article
42
- IET Information Security (Wiley-Blackwell), 2018, v. 12, n. 4, p. 375, doi. 10.1049/iet-ifs.2017.0107
- Ping, Yuan;
- Wang, Baocang;
- Tian, Shengli;
- Yang, Yuehua;
- Du, Genyuan
- Article
43
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 5, p. 230, doi. 10.1049/iet-ifs.2016.0014
- Yang, Dong;
- Qi, Wen‐Feng;
- Tian, Tian
- Article
44
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 3, p. 146, doi. 10.1049/iet-ifs.2015.0432
- Article
45
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 3, p. 121, doi. 10.1049/iet-ifs.2015.0433
- Article
46
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 2, p. 89, doi. 10.1049/iet-ifs.2015.0052
- Cui, Ting;
- Jin, Chenhui;
- Zhang, Bin;
- Chen, Zhuo;
- Zhang, Guoshuang
- Article
47
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 3, p. 142, doi. 10.1049/iet-ifs.2015.0026
- Article
48
- IET Information Security (Wiley-Blackwell), 2015, v. 9, n. 4, p. 209, doi. 10.1049/iet-ifs.2013.0549
- Zhao, Guangyao;
- Li, Ruilin;
- Cheng, Lei;
- Li, Chao;
- Sun, Bing
- Article
49
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 213, doi. 10.1049/iet-ifs.2012.0279
- Wang, Xing‐Yuan;
- Gu, Sheng‐Xian
- Article
50
- IET Information Security (Wiley-Blackwell), 2014, v. 8, n. 3, p. 207, doi. 10.1049/iet-ifs.2011.0332
- Article