Information security protocol based system identification with binary-valued observations (Q1621182): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(2 intermediate revisions by 2 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s11424-017-7075-7 / rank
Normal rank
 
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s11424-017-7075-7 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2644864076 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Optimal military spending, trade and stochastic economic growth / rank
 
Normal rank
Property / cites work
 
Property / cites work: Distributed Consensus With Limited Communication Data Rate / rank
 
Normal rank
Property / cites work
 
Property / cites work: A multi-channel transmission schedule for remote state estimation under DoS attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Player simulation and general adversary structures in perfect multiparty computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully homomorphic encryption using ideal lattices / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S11424-017-7075-7 / rank
 
Normal rank

Latest revision as of 23:08, 10 December 2024

scientific article
Language Label Description Also known as
English
Information security protocol based system identification with binary-valued observations
scientific article

    Statements

    Information security protocol based system identification with binary-valued observations (English)
    0 references
    0 references
    0 references
    0 references
    8 November 2018
    0 references
    cryptography
    0 references
    identification algorithm
    0 references
    information security
    0 references
    passive attacks
    0 references
    security protocol
    0 references
    time complexity
    0 references

    Identifiers