Information security protocol based system identification with binary-valued observations (Q1621182): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(3 intermediate revisions by 3 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s11424-017-7075-7 / rank
Normal rank
 
Property / MaRDI profile type
 
Property / MaRDI profile type: Publication / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s11424-017-7075-7 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2644864076 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal military spending, trade and stochastic economic growth / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distributed Consensus With Limited Communication Data Rate / rank
 
Normal rank
Property / cites work
 
Property / cites work: A multi-channel transmission schedule for remote state estimation under DoS attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Player simulation and general adversary structures in perfect multiparty computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S11424-017-7075-7 / rank
 
Normal rank

Latest revision as of 00:08, 11 December 2024

scientific article
Language Label Description Also known as
English
Information security protocol based system identification with binary-valued observations
scientific article

    Statements

    Information security protocol based system identification with binary-valued observations (English)
    0 references
    0 references
    0 references
    0 references
    8 November 2018
    0 references
    cryptography
    0 references
    identification algorithm
    0 references
    information security
    0 references
    passive attacks
    0 references
    security protocol
    0 references
    time complexity
    0 references

    Identifiers