Bases bibliographiques Pascal et Francis

Aide

Résultats de votre recherche

Votre recherche

kw.\*:("Ecoute clandestine")

Année de publication [py]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Discipline (document) [di]

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Pays auteur

A-Z Z-A Fréquence ↓ Fréquence ↑
Export CSV

Résultats 1 à 25 sur 343

  • Page / 14
Export

Sélection :

  • et

Security of information in IT systemsKALICZYNSKA, Malgorzata.SPIE proceedings series. 2005, pp 571-576, isbn 0-8194-5756-6, 6 p.Conference Paper

Divertible and subliminal-free zero-knowledge proofs for languagesBURMESTER, M; DESMEDT, Y. G; ITOH, T et al.Journal of cryptology. 1999, Vol 12, Num 3, pp 197-223, issn 0933-2790Article

On a Conjecture by Belfiore and Sole on Some LatticesERNVALL-HYTÖNEN, Anne-Maria.IEEE transactions on information theory. 2012, Vol 58, Num 9, pp 5950-5955, issn 0018-9448, 6 p.Article

Information theoretically secure communication in the limited storage space modelAUMANN, Y; RABIN, M. O.Lecture notes in computer science. 1999, pp 65-79, issn 0302-9743, isbn 3-540-66347-9Conference Paper

Developing in technology in the fight against fraudVEDDER, K.GSM world congress. 1996, pp 1-11Conference Paper

Covert channels in LAN'sGIRLING, C. G.IEEE transactions on software engineering. 1987, Vol 13, Num 2, pp 292-296, issn 0098-5589Article

The Jack Butcher Case: A Story of Courage, Commitment, and ConcernFLYNN, William G; MANEKI, Sharon.Cryptologia. 2013, Vol 37, Num 3, pp 210-214, issn 0161-1194, 5 p.Article

Wiretap Channel With Side InformationYANLING CHEN; HAN VINCK, A. J.IEEE transactions on information theory. 2008, Vol 54, Num 1, pp 395-402, issn 0018-9448, 8 p.Article

Randomized quantum key distributionSHER, Muhammad; MUSHARRAF, Muhammad; MAGEDANZ, Thomas et al.Journal of optical communications. 2006, Vol 27, Num 5, pp 278-281, issn 0173-4911, 4 p.Article

From the Archives: Colonel Butler's Satire of Bletchley ParkGREY, Christopher.Cryptologia. 2014, Vol 38, Num 3, pp 266-275, issn 0161-1194, 10 p.Article

From Identification to Signatures Via the Fiat-Shamir Transform : Necessary and Sufficient Conditions for Security and Forward-SecurityABDALLA, Michel; JEE HEA AN; BELLARE, Mihir et al.IEEE transactions on information theory. 2008, Vol 54, Num 8, pp 3631-3646, issn 0018-9448, 16 p.Article

Wiretap Channels: Implications of the More Capable Condition and Cyclic Shift SymmetryOZEL, Omur; ULUKUS, Sennur.IEEE transactions on information theory. 2013, Vol 59, Num 4, pp 2153-2164, issn 0018-9448, 12 p.Article

Security difficulies with a recently proposed choatic based communication techniqueLEESON, M. S.Electronics Letters. 1994, Vol 30, Num 24, pp 2014-2015, issn 0013-5194Article

Some Results Related to the Conjecture by Belfiore and SoléERNVALL-HYTÖNEN, Anne-Maria.IEEE transactions on information theory. 2014, Vol 60, Num 5, pp 2805-2812, issn 0018-9448, 8 p.Article

General nonasymptotic and asymptotic formulas in channel resolvability and identification capacity and their application to the wiretap channelHAYASHI, Masahito.IEEE transactions on information theory. 2006, Vol 52, Num 4, pp 1562-1575, issn 0018-9448, 14 p.Article

Unconditionally secure quantum key distribution over 50 km of standard telecom fibreGOBBY, C; YUAN, Z. L; SHIELDS, A. J et al.Electronics Letters. 2004, Vol 40, Num 25, pp 1603-1605, issn 0013-5194, 3 p.Article

Three-Receiver Broadcast Channels With Common and Confidential MessagesCHIA, Yeow-Khiang; EL GAMAL, Abbas.IEEE transactions on information theory. 2012, Vol 58, Num 5, pp 2748-2765, issn 0018-9448, 18 p.Article

Rate regions of secret key sharing in a new source modelSALIMI, S; SALMASIZADEH, M; AREF, M. R et al.IET communications (Print). 2011, Vol 5, Num 4, pp 443-455, issn 1751-8628, 13 p.Article

Security and Privacy Analysis of Tree-LSHB+ ProtocolXIAOFEI QIAN; XINBAO LIU; SHANLIN YANG et al.Wireless personal communications. 2014, Vol 77, Num 4, pp 3125-3141, issn 0929-6212, 17 p.Article

Artificial-Noise Alignment for Secure Multicast using Multiple AntennasKHISTI, Ashish; DONGYE ZHANG.IEEE communications letters. 2013, Vol 17, Num 8, pp 1568-1571, issn 1089-7798, 4 p.Article

Improving User's Privacy for Multi-Authority ABE Using Privacy HomomorphismANG GAO; LI, Zeng-Zhi.IEICE transactions on fundamentals of electronics, communications and computer science. 2013, Vol 96, Num 3, pp 724-727, issn 0916-8508, 4 p.Article

Strengthening the Security of EPC C-1 G-2 RFID StandardSAFKHANI, Masoumeh; BAGHERI, Nasour; NADERI, Majid et al.Wireless personal communications. 2013, Vol 72, Num 2, pp 1295-1308, issn 0929-6212, 14 p.Article

Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical UncertaintyJIANGYUAN LI; PETROPULU, Athina P.IEEE transactions on signal processing. 2012, Vol 60, Num 7, pp 3892-3895, issn 1053-587X, 4 p.Article

Learning About Tool Categories via EavesdroppingPHILLIPS, Brenda; SESTON, Rebecca; KELEMEN, Deborah et al.Child development. 2012, Vol 83, Num 6, pp 2057-2072, issn 0009-3920, 16 p.Article

Securing Dynamic Distributed Storage Systems Against Eavesdropping and Adversarial AttacksPAWAR, Sameer; ROUAYHEB, Salim El; RAMCHANDRAN, Kannan et al.IEEE transactions on information theory. 2011, Vol 57, Num 10, pp 6734-6753, issn 0018-9448, 20 p.Article

  • Page / 14