Found: 8
Select item for more details and to access through your institution.
Open code for open science?
- Published in:
- Nature Geoscience, 2014, v. 7, n. 11, p. 779, doi. 10.1038/ngeo2283
- By:
- Publication type:
- Article
Critical analysis of counter mode with cipher block chain message authentication mode protocol-CCMP.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 2, p. 293, doi. 10.1002/sec.733
- By:
- Publication type:
- Article
Realization of three-qubit quantum error correction with superconducting circuits.
- Published in:
- Nature, 2012, v. 482, n. 7385, p. 382, doi. 10.1038/nature10786
- By:
- Publication type:
- Article
The Soul of a New Watson.
- Published in:
- IEEE Software, 2011, v. 28, n. 4, p. 9, doi. 10.1109/MS.2011.85
- By:
- Publication type:
- Article
HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES.
- Published in:
- International Journal of Foundations of Computer Science, 2010, v. 21, n. 6, p. 1049, doi. 10.1142/S0129054110007726
- By:
- Publication type:
- Article
Just-In-Time Cache for Capsule-Based Active Networks.
- Published in:
- Computer Journal, 2009, v. 52, n. 6, p. 671, doi. 10.1093/comjnl/bxp006
- By:
- Publication type:
- Article
ESTIMATORS IN CRYPTOGRAPHIC MODELS.
- Published in:
- Annals of DAAAM & Proceedings, 2009, p. 883
- By:
- Publication type:
- Article
Coding Disaggregated Intrastate Conflict: Machine Processing the Behavior of Substate Actors Over Time and Space.
- Published in:
- Political Analysis, 2008, v. 16, n. 4, p. 464, doi. 10.1093/pan/mpn008
- Publication type:
- Article