Works about CIPHERS


Results: 1914
    1
    2
    3
    4

    Safety in Numbers.

    Published in:
    Sciences, 1981, v. 21, n. 6, p. 8
    By:
    • Davida, George I.
    Publication type:
    Article
    5
    6
    7
    8
    9
    10
    11
    12

    Attribute-Based Traitor Tracing.

    Published in:
    Journal of Information Science & Engineering, 2011, v. 27, n. 1, p. 181
    By:
    • YONG-TAO WANG;
    • KE-FEI CHEN;
    • JIAN-HONG CHEN
    Publication type:
    Article
    13
    14
    15
    16
    17
    18
    19

    The Galileo code.

    Published in:
    Communications Engineer, 2006, v. 4, n. 4, p. 10, doi. 10.1049/ce:20060401
    By:
    • Sandham, D.
    Publication type:
    Article
    20
    21
    22
    23
    24
    25
    26

    Symbolic object code analysis.

    Published in:
    International Journal on Software Tools for Technology Transfer, 2014, v. 16, n. 1, p. 81, doi. 10.1007/s10009-012-0256-8
    By:
    • Mühlberg, Jan;
    • Lüttgen, Gerald
    Publication type:
    Article
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40

    Ancient Encryption.

    Published in:
    ISSA Journal, 2016, v. 14, n. 7, p. 47
    By:
    • Martin, Luther
    Publication type:
    Article
    41

    SENDING CABLEGRAMS.

    Published in:
    Journal of Education, 1894, v. 40, n. 13, p. 226
    Publication type:
    Article
    42
    43
    44
    45
    46
    47
    48

    应用于六边形网格的链码方法.

    Published in:
    Geomatics & Information Science of Wuhan University, 2019, v. 44, n. 11, p. 1700, doi. 10.13203/j.whugis20180018
    By:
    • 魏小峰;
    • 苗双喜;
    • 濮国梁;
    • 陈波;
    • 程承旗
    Publication type:
    Article
    49
    50