Discovery - Top 10

Language

Search

Current filters:
Start a new search
Add filters:

Use filters to refine the search results.

Results 1-25 of 50 (Search time: 0.007 seconds).

TitleAuthor(s)Issue Date
 
Strong Cryptographic Library - Implementation and Applications
Proceeding/Conference:Proceedings of the 9th Hong Kong computer Society Database Conference
1999
 
1993
 
1989
 
1993
 
1989
 
Digital evidence search kit
Proceeding/Conference:Proceedings - First International Workshop on Systematic Approaches to Digital Forensic Engineering
2005
 
Separable and anonymous identity-based key issuing
Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS
2005
 
2000
 
1999
 
Efficiently rendering large volume data using texture mapping hardware
Proceeding/Conference:Joint EUROGRAPHICS - IEEE TCCG Symposium on Visualization Proceedings
1999
 
Probabilistic segmentation of volume data for visualization using SOM-PNN classifier
Proceeding/Conference:IEEE Symposium on Volume Visualization
1998
Finding motifs for insufficient number of sequences with strong binding to transcription factor
Proceeding/Conference:RECOMB 2004 - Proceedings of the Eighth Annual International Conference on Research in Computational Molecular Biology
2004
 
Secure and Practical Tree-structure Signature Schemes Based on Discrete Logarithms
Proceeding/Conference:Public Key Cryptography. PKC 2000
2000
 
2001
 
Design of a Cyber Forensic Tool
Proceeding/Conference:International Transnational Organized Crime Conference
2002
 
The chi-square test when the expected frequencies are less than 5
Proceeding/Conference:Proceedings of the COMPSTAT 2006, 17th Symposium of IASC
2006
 
Delegation of Signing and Decryption Rights using PKI Proxy Memo
Proceeding/Conference:Proceedings of the IASTED International Conference in Software Engineering
2004
Randomly generating triangulations of a simple polygon
Proceeding/Conference:Lecture Notes in Computer Science
2005
 
An Attack on Libert et al.’s ID-Based Undeniable Signature Scheme
Journal:International Journal of Network Security
2007
 
2006
 
Some difficult-to-pass tests of randomness
Journal:Journal of Statistical Software
2002
 
1991
 
The Monty Python Method for Generating Random Variables
Journal:ACM Transactions on Mathematical Software
1998
 
The ziggurat method for generating random variables
Journal:Journal of Statistical Software
2000
 
Toward a universal random number generator
Journal:Statistics and Probability Letters
1990