Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Secrecy")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 1432

  • Page / 58
Export

Selection :

  • and

On a Conjecture by Belfiore and Sole on Some LatticesERNVALL-HYTÖNEN, Anne-Maria.IEEE transactions on information theory. 2012, Vol 58, Num 9, pp 5950-5955, issn 0018-9448, 6 p.Article

The experiences of christians during the underground years and thereafterNOSCO, Peter.Japanese journal of religious studies. 2007, Vol 34, Num 1, pp 85-97, issn 0304-1042, 13 p.Article

Donor gametes : anonymous or identified?DANIELS, Ken.Baillière's best practice & research. Clinical obstetrics & gynaecology. 2007, Vol 21, Num 1, pp 113-128, issn 1521-6934, 16 p.Article

Secure key-evolving protocols for discrete logarithm schemesLU, Cheng-Fen; SHIUHPYNG WINSTON SHIEH.Lecture notes in computer science. 2002, pp 300-309, issn 0302-9743, isbn 3-540-43224-8Conference Paper

The Relations Between Secrecy, Rejection Sensitivity and Autonomy-ConnectednessWISMEIJER, Andreas A. J; VAN ASSEN, Marcel A. L. M; BEKKER, Marrie H. J et al.The Journal of general psychology. 2014, Vol 141, Num 2, pp 65-79, issn 0022-1309, 15 p.Article

Coding Theorems for the Shannon Cipher System With a Guessing Wiretapper and Correlated Source OutputsHAYASHI, Yutaka; YAMAMOTO, Hirosuke.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2808-2817, issn 0018-9448, 10 p.Article

L'étrange et le secret : L'étrange = The strangeness and the secretMAUREY, G.Etudes psychothérapiques (Bruxelles). 1998, Vol 17, pp 137-150, issn 0246-7887Article

Pratical and provably secure release of a secret and exchange of signaturesBJERRE DAMGARD, I.Journal of cryptology. 1995, Vol 8, Num 4, pp 201-222, issn 0933-2790Article

Schutz vor Persönlichkeitsrechten bei der Nutzung Neuer Medien = Protection des droits de la personne dans l'utilisation des nouveaux médiaGARSTKA, H.Datenverarbeitung im Recht. Beiheft. 1984, Num 16, pp 79-86, issn 0722-4257Conference Paper

Attack on server assisted authentication protocolsANDERSON, R. J.Electronics Letters. 1992, Vol 28, Num 15, issn 0013-5194, p. 1473Article

Patent, copyright and trade secret protection for computer softwareDONOVAN, S.IEEE antennas & propagation magazine. 1992, Vol 34, Num 1, pp 33-38, issn 1045-9243Article

Le secret dans le bouddhisme = Secrecy in BuddhismWEIBEL, Nadine B.Revue de droit canonique (Strasbourg). 2002, Vol 52, Num 2, pp 329-338, issn 0556-7378, 10 p., 478, 482 [12 p.]Article

Le secret maçonnique = The Masonic secretETIENNE, Bruno.Revue de droit canonique (Strasbourg). 2002, Vol 52, Num 2, pp 339-354, issn 0556-7378, 16 p., 479, 483 [18 p.]Article

Access to restricted collections: the responsibility of professional historical organizationsHOFF-WILSON, J.The American archivist. 1983, Vol 46, Num 4, pp 441-447, issn 0360-9081Article

The wish to keep pregnancy secretANDRESEN, J. J.Psychoanalytic review (1963). 1983, Vol 70, Num 2, pp 163-177, issn 0033-2836Article

THE CHAMBIR OF MY THOUGHT: SELF AND CONDUCT IN AN EARLY ISLAMIC ETHICAL TREATISEKHAN, Ruqayya Yasmine.History of religions. 2009, Vol 49, Num 1, pp 27-47, issn 0018-2710, 21 p.Article

On Secrecy of Codebook-Based Transmission Beamforming under Receiver Limited FeedbackBASHAR, Shafi; ZHI DING; GEOFFREY YE LI et al.IEEE transactions on wireless communications. 2011, Vol 10, Num 4, pp 1212-1223, issn 1536-1276, 12 p.Article

Some Results Related to the Conjecture by Belfiore and SoléERNVALL-HYTÖNEN, Anne-Maria.IEEE transactions on information theory. 2014, Vol 60, Num 5, pp 2805-2812, issn 0018-9448, 8 p.Article

Big secrets do not necessarily cause hills to appear steeperLEBEL, Etienne P; WILBUR, Christopher J.Psychonomic bulletin & review. 2014, Vol 21, Num 3, pp 696-700, issn 1069-9384, 5 p.Article

ENERGING FEDERAL GOVERNMENT ACTIONS IN TELECOMMUNICATIONS PROTECTIONSKRAFT DE; WILK CK.1979; PROC. NATION. ELECTRON. CONF.; USA; DA. 1979; VOL. 33; PP. 314-317; BIBL. 6 REF.Conference Paper

Conservation: aspects techniquesELOY, M.Le droit de la preuve face aux nouvelles technologies de l'information. Cahiers du CRID. 1991, Num 7, pp 130-152Book Chapter

Secure Diversity-Multiplexing Tradeoff of Zero-Forcing Transmit Scheme at Finite-SNRREZKI, Zouheir; ALOUINI, Mohamed-Slim.IEEE transactions on communications. 2012, Vol 60, Num 4, pp 1138-1147, issn 0090-6778, 10 p.Article

Weaknesses in the Hur-Shin-Yoon decentralized group key managementJUNG YEON HWANG; JI YOUNG CHUN; DONG HOON LEE et al.Wireless communications and mobile computing (Print). 2009, Vol 9, Num 12, pp 1565-1571, issn 1530-8669, 7 p.Article

On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQXINRONG GUAN; YUEMING CAI; WEIWEI YANG et al.IEEE communications letters. 2014, Vol 18, Num 3, pp 479-482, issn 1089-7798, 4 p.Article

Explicit Solution of Worst-Case Secrecy Rate for MISO Wiretap Channels With Spherical UncertaintyJIANGYUAN LI; PETROPULU, Athina P.IEEE transactions on signal processing. 2012, Vol 60, Num 7, pp 3892-3895, issn 1053-587X, 4 p.Article

  • Page / 58