Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Search key")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 131

  • Page / 6
Export

Selection :

  • and

Distinguishing attacks on SOBER-t16 and t32EKDAHL, Patrik; JOHANSSON, Thomas.Lecture notes in computer science. 2002, pp 210-224, issn 0302-9743, isbn 3-540-44009-7, 15 p.Conference Paper

Some average performance measures for the B-treeWRIGHT, W. E.Acta informatica. 1985, Vol 21, Num 6, pp 541-557, issn 0001-5903Article

On optimal arrangement of keys with double hashingYAO, A. C.Journal of algorithms (Print). 1985, Vol 6, Num 2, pp 253-264, issn 0196-6774Article

Interpolation-binary searchSANTORO, N; SIDNEY, J. B.Information processing letters. 1985, Vol 20, Num 4, pp 179-181, issn 0020-0190Article

Universal retrieval treesKRICHEVSKY, R. E; RYABKO, B. YA.Discrete applied mathematics. 1985, Vol 12, Num 3, pp 291-302, issn 0166-218XArticle

Partial match retrieval in implicit data structuresALT, H; MEHLHORN, K; MUNRO, J. I et al.Information processing letters. 1984, Vol 19, Num 2, pp 61-65, issn 0020-0190Article

Public-key cryptosystem and digital-signature schemes based on linear algebra over a local ringZU-HUA, S.IEE proceedings. Part E. Computers and digital techniques. 1987, Vol 134, Num 5, pp 254-256, issn 0143-7062Article

Optimal multiway search trees for variable size keysSZWARCFITER, J. L.Acta informatica. 1984, Vol 21, Num 1, pp 47-60, issn 0001-5903Article

Partitioned encryption and achieving simultaneity by partitioningGALIL, Z; YUNG, M.Information processing letters. 1987, Vol 26, Num 2, pp 81-88, issn 0020-0190Article

An optimal algorithm for assigning cryptographic keys to control access in a hierarchyMACKINNON, S. J; TAYLOR, P. D; MEIJER, H et al.IEEE transactions on computers. 1985, Vol 34, Num 9, pp 797-802, issn 0018-9340Article

Cryptanalysis of SOBER-t32BABBAGE, Steve; DE CANNIERE, Christophe; LANO, Joseph et al.Lecture notes in computer science. 2003, pp 111-128, issn 0302-9743, isbn 3-540-20449-0, 18 p.Conference Paper

Rank order distributions and secondary key indexingSAMSON, W. B; BENDELL, A.Computer journal (Print). 1985, Vol 28, Num 3, pp 309-312, issn 0010-4620Article

Algorithme de décomposition de clés = Key decomposition algorithmPICHAT, E.R.A.I.R.O. Informatique théorique. 1985, Vol 19, Num 3, pp 213-232, issn 0399-0540Article

Optimal information retrieval when queries are not randomCHANG, C. C.Information sciences. 1984, Vol 34, Num 3, pp 199-223, issn 0020-0255Article

Multidimensional search trees that provide new types of memory reductionsWILLARD, D. E.Journal of the Association for Computing Machinery. 1987, Vol 34, Num 4, pp 846-858, issn 0004-5411Article

On the number of keys in minimal 2-3 brother treesSASTRY, V. U. K; MURTHY, T. N. V.International journal of computer mathematics. 1986, Vol 19, Num 3-4, pp 267-269, issn 0020-7160Article

SYSTEME ASSOCIATIF DE RECHERCHE D'INFORMATIONSLECALVE A; KALFON P.1981; MACHINES BASES DE DONNEES. JOURNEES/1980/SOPHIA ANTIPOLIS; FRA; ROCQUENCOURT: INRIA; DA. 1981; PP. 85-104Conference Paper

OPTIMAL ASSOCIATION WITH PARTLY MISSING KEY VECTORSMURAKAMI K; AIBARA T.1982; BIOL. CYBERN.; ISSN 0340-1200; DEU; DA. 1982; VOL. 44; NO 2; PP. 151-155; BIBL. 15 REF.Article

On the success probability of X2-attack on RC6MIAJI, Atsuko; TAKANO, Yuuki.Lecture notes in computer science. 2005, pp 61-74, issn 0302-9743, isbn 3-540-26547-3, 14 p.Conference Paper

A comparison of USMARC and UNIMARC for system designMCKERCHER, B; XIN CHANG, P.International cataloguing and bibliographic control. 1995, Vol 24, Num 2, pp 21-25, issn 1011-8829Article

A research of see also' reference in the terminological dictionary: using semantic relations between entriesFUKUDA, M; KAGEURA, K.Library and Information Science. 1993, Num 31, pp 1-23, issn 0373-4447Article

A combinatorial approach to threshold schemesSTINSON, D. R; VANSTONE, S. A.SIAM journal on discrete mathematics. 1988, Vol 1, Num 2, pp 230-236Article

Linear probing with a nonuniform address distributionPFLUG, G. C; KESSLER, H. W.Journal of the Association for Computing Machinery. 1987, Vol 34, Num 2, pp 397-410, issn 0004-5411Article

Lattice model of browsable data spacesGODIN, R; SAUNDERS, E; GECSEI, J et al.Information sciences. 1986, Vol 40, Num 2, pp 89-116, issn 0020-0255Article

Design and analysis of password-based key derivation functionsYAO, Frances F; YIQUN LISA YIN.Lecture notes in computer science. 2005, pp 245-261, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

  • Page / 6