Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Tierce partie")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 98

  • Page / 4
Export

Selection :

  • and

Multi-party quantum private comparison protocol with n-level entangled statesWANG, Qing-Le; SUN, Hong-Xiang; WEI HUANG et al.Quantum information processing (Print). 2014, Vol 13, Num 11, pp 2375-2389, issn 1570-0755, 15 p.Article

Third party observersMACCAFFREY, Robert J.Journal of forensic neuropsychology. 2005, Vol 4, Num 2, issn 1521-1029, 96 p.Serial Issue

Web Annotation as a First-Class ObjectCICCARESE, Paolo; SOILAND-REYES, Stian; CLARK, Tim et al.IEEE internet computing. 2013, Vol 17, Num 6, pp 71-75, issn 1089-7801, 5 p.Article

Aiding peace, abetting violence : Third parties and the management of conflict = Aider la paix, encourager la violence : Tierces parties et gestion de conflitPHILLIPS, Scott; COONEY, Mark.American sociological review. 2005, Vol 70, Num 2, pp 334-354, issn 0003-1224, 21 p.Article

Children, Family and the State: Revisiting Public and Private RealmsWYNESS, Michael.Sociology (Oxford. Print). 2014, Vol 48, Num 1, pp 59-74, issn 0038-0385, 16 p.Article

A Web 2.0 Citizen-Centric Model for T-Government ServicesDAIS, Alexandros; NIKOLAIDOU, Mara; ANAGNOSTOPOULOS, Dimosthenis et al.IEEE intelligent systems. 2013, Vol 28, Num 5, pp 10-18, issn 1541-1672, 9 p.Article

People as a Service: A Mobile-centric Model for Providing Collective Sociological Profiles : NEXT-GENERATION MOBILE COMPUTINGGUILLEN, Joaquín; MIRANDA, Javier; BERROCAL, Javier et al.IEEE software. 2014, Vol 31, Num 2, pp 48-53, issn 0740-7459, 6 p.Article

Weighing third-party fairness, efficiency, and self-interest in resource allocation decisionsJOHANSSON, Lars-Olof; GUSTAFSSON, Mathias; OLSSON, Lars et al.Journal of economic psychology. 2007, Vol 28, Num 1, pp 53-68, issn 0167-4870, 16 p.Article

"THIRD-PARTY INVESTING IN ENERGY PROGRAMS"RAUCH RJ.1982; ENERGY EFFICIENCY IN THE EIGHTIES. ENERGY TECHNOLOGY CONFERENCE. 9/1982-02-16/WASHINGTON DC; USA; ROCKVILLE: GOVERNMENT INSTITUTES; DA. 1982; PP. 128-134Conference Paper

Automatic shut-off valvesLASHOTO, P.Pipeline & gas journal. 1989, Vol 216, Num 11, pp 30-34, issn 0032-0188, 4 p.Article

RIPS identifies pipe line risksMUHLBAUER, W. K.Pipe line industry. 1990, Vol 73, Num 3, pp 35-38, issn 0032-0145, 4 p.Article

Anonymity and closely related terms in the cyberspace: An analysis by example : Identity Protection and ManagementKAMBOURAKIS, Georgios.Journal of information security and applications. 2014, Vol 19, Num 1, pp 2-17, 16 p.Article

Efficient and feasible quantum private comparison of equality against the collective amplitude damping noiseCHEN, Xiu-Bo; YUAN SU; NIU, Xin-Xin et al.Quantum information processing (Print). 2014, Vol 13, Num 1, pp 101-112, issn 1570-0755, 12 p.Article

Independent verification of proxy multi-signature schemeHE DU; JIAN WANG; LIU, Ya-Nan et al.International journal of computational science and engineering (Print). 2014, Vol 9, Num 4, pp 301-311, issn 1742-7185, 11 p.Article

Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third partyZHANG, Wei-Wei; ZHANG, Ke-Jia.Quantum information processing (Print). 2013, Vol 12, Num 5, pp 1981-1990, issn 1570-0755, 10 p.Article

Bidirectional controlled quantum teleportation and secure direct communication using five-qubit entangled stateLI, Yuan-Hua; LI, Xiao-Ian; SANG, Ming-Huang et al.Quantum information processing (Print). 2013, Vol 12, Num 12, pp 3835-3844, issn 1570-0755, 10 p.Article

Quantum private comparison of equality protocol without a third partyLIN, Jason; YANG, Chun-Wei; TZONELIH HWANG et al.Quantum information processing (Print). 2014, Vol 13, Num 2, pp 239-247, issn 1570-0755, 9 p.Article

Toward a secure Kerberos key exchange with smart cardsMAVROGIANNOPOULOS, Nikos; PASHALIDIS, Andreas; PRENEEL, Bart et al.International journal of information security (Print). 2014, Vol 13, Num 3, pp 217-228, issn 1615-5262, 12 p.Article

A quantum protocol for millionaire problem with Bell statesZHANG, Wei-Wei; DAN LI; ZHANG, Ke-Jia et al.Quantum information processing (Print). 2013, Vol 12, Num 6, pp 2241-2249, issn 1570-0755, 9 p.Article

Reexamination of arbitrated quantum signature: the impossible and the possibleZHANG, Ke-Jia; QIN, Su-Juan; YING SUN et al.Quantum information processing (Print). 2013, Vol 12, Num 9, pp 3127-3141, issn 1570-0755, 15 p.Article

An arbitrated quantum signature scheme with fast signing and verifyingFENG LIU; QIN, Su-Juan; QI SU et al.Quantum information processing (Print). 2014, Vol 13, Num 2, pp 491-502, issn 1570-0755, 12 p.Article

Multi-party quantum private comparison protocol based on d-dimensional entangled statesLUO, Qing-Bin; YANG, Guo-Wu; KUN SHE et al.Quantum information processing (Print). 2014, Vol 13, Num 10, pp 2343-2352, issn 1570-0755, 10 p.Article

Security Analysis of a Suite of Deniable Authentication ProtocolsHAIBO TIAN; XIAOFENG CHEN; BAODIAN WEI et al.International journal of network security (Print). 2013, Vol 15, Num 5, pp 384-389, issn 1816-353X, 6 p.Article

Differential phase shift quantum private comparisonLIU, Xing-Tong; BO ZHANG; JIAN WANG et al.Quantum information processing (Print). 2014, Vol 13, Num 1, pp 71-84, issn 1570-0755, 14 p.Article

Improving the security of arbitrated quantum signature against the forgery attackZHANG, Ke-Jia; ZHANG, Wei-Wei; DAN LI et al.Quantum information processing (Print). 2013, Vol 12, Num 8, pp 2655-2669, issn 1570-0755, 15 p.Article

  • Page / 4