Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Transmission message")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 2006

  • Page / 81
Export

Selection :

  • and

Efficient perfectly secure message transmission in synchronous networksSAYEED, H. M; ABU-AMARA, H.Information and computation (Print). 1996, Vol 126, Num 1, pp 53-61, issn 0890-5401Article

A general purpose communications shell for a network of transputersWARING, L. C.Microprocessing and microprogramming. 1990, Vol 29, Num 2, pp 107-119, issn 0165-6074, 13 p.Article

A new method for constructing minimal broadcast networksVENTURA, J. A; WENG, X.Networks (New York, NY). 1993, Vol 23, Num 5, pp 481-497, issn 0028-3045Article

Authenticated encryption schemes with linkage between message blocksLEE, W.-B; CHANG, C.-C.Information processing letters. 1997, Vol 63, Num 5, pp 247-250, issn 0020-0190Article

Centrale de mesure = A purpose-built telephone exchangeCattiaux, Yves.1990, 10 p.Report

Combined mobile telephone and dispatch services in a cellular land-mobile radio systemMCDONNELL, M; GEORGANAS, N. D.IEE proceedings. Part F. Communications, radar and signal processing. 1984, Vol 131, Num 4, pp 357-363, issn 0143-7070Article

Email licensingJOUNG, Yuh-Jzer; YANG, Chu-Jui.Journal of network and computer applications. 2009, Vol 32, Num 3, pp 538-549, issn 1084-8045, 12 p.Article

Service management system for interactive TV distributionZAHARIADIS, Th; ZERVOS, N; NIKOLAOU, N et al.International workshopon systems, signals and image processing, ambient multimedia. 2004, pp 71-74, isbn 83-906074-8-4, 4 p.Conference Paper

Object identification in the Lego kernelHUGHES, L.Software, practice & experience. 1993, Vol 23, Num 4, pp 405-418, issn 0038-0644Article

A new generalized group-oriented cryptoscheme without trusted centersCHIN-CHEN CHANG; HORNG-CHIN LEE.IEEE journal on selected areas in communications. 1993, Vol 11, Num 5, pp 725-729, issn 0733-8716Article

Technisches Konzept des seriellen Bus-systems CAN. II = Technical concept of the CAN Serial Bus-Systems. IIDAIS, S; UNRUH, J.ATZ. Automobiltechnische Zeitschrift. 1992, Vol 94, Num 4, pp 208-215, issn 0001-2785, 6 p.Article

Constant phase bit optimal protocols for perfectly reliable and secure message transmissionPATRA, Arpita; CHOUDHARY, Ashish; SRINATHAN, K et al.Lecture notes in computer science. 2006, pp 221-235, issn 0302-9743, isbn 3-540-49767-6, 1Vol, 15 p.Conference Paper

Message delay analysis for TDMA schemes using contiguous-slot assignmentsRUBIN, I; ZHENSHENG ZHANG.IEEE transactions on communications. 1992, Vol 40, Num 4, pp 730-737, issn 0090-6778Article

On the proof of a distributed algorithmVERJUS, J. P.Information processing letters. 1987, Vol 25, Num 3, pp 145-147, issn 0020-0190Article

A CURE FOR THE TELEPHONE DISEASEHAJNAL A; MILNER EC; SZEMEREDI E et al.1972; BULL. CANAD. MATH.; CANADA; DA. 1972; VOL. 15; NO 3; PP. 447-450Serial Issue

A new look at an old protocolSYVERSON, P. F.Operating systems review. 1996, Vol 30, Num 3, pp 1-4, issn 0163-5980Article

A very short proof of a conjecture concerning set-to-set broadcastingQIAO LI; ZHONGLIANG ZHANG; JUNMING XU et al.Networks (New York, NY). 1993, Vol 23, Num 4, pp 449-450, issn 0028-3045Article

Expression et réalisation du contrôle d'exécution dans un système réparti = Expression and implementation of execution control in a distributed systemROZIER, Marc; KRAKOWIAK, Sacha.1986, 184 pThesis

An O(log n) expected rounds randomized byzantine generals protocolBRACHA, G.Journal of the Association for Computing Machinery. 1987, Vol 34, Num 4, pp 910-920, issn 0004-5411Article

The forwarding diameter of graphsFERNANDEZ DE LA VEGA, W; EL HADDAD, M; BARRAEZ, D et al.Discrete applied mathematics. 1998, Vol 86, Num 2-3, pp 201-211, issn 0166-218XArticle

A simple mechanism for type security across compilation unitsSCOTT, M. L; FINKEL, R. A.IEEE transactions on software engineering. 1988, Vol 14, Num 8, pp 1238-1239, issn 0098-5589Article

Optimal perfectly secure message transmissionSRINATHAN, K; NARAYANAN, Arvind; RANGAN, C. Pandu et al.Lecture notes in computer science. 2004, pp 545-561, issn 0302-9743, isbn 3-540-22668-0, 17 p.Conference Paper

Ip over HF as a bearer service for NATO formal messagesJODALEN, V; SOLBERG, B; EGGEN, A et al.IEE conference publication. 2003, pp 19-24, issn 0537-9989, isbn 0-85296-755-1, 6 p.Conference Paper

Hyper-encryption and everlasting securityYAN ZONG DING; RABIN, Michael O.Lecture notes in computer science. 2002, pp 1-26, issn 0302-9743, isbn 3-540-43283-3Conference Paper

An optimistic non-repudiation protocol with transparent trusted third partyMARKOWITCH, Olivier; KREMER, Steve.Lecture notes in computer science. 2001, pp 363-378, issn 0302-9743, isbn 3-540-42662-0Conference Paper

  • Page / 81