Pages that link to "Item:Q2790420"
From MaRDI portal
The following pages link to Computation, Cryptography, and Network Security (Q2790420):
Displayed 27 items.
- Transformations of Cryptographic Schemes Through Interpolation Techniques (Q2790421) (← links)
- Flaws in the Initialisation Process of Stream Ciphers (Q2790423) (← links)
- Producing Fuzzy Inclusion and Entropy Measures (Q2790425) (← links)
- On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (Q2790426) (← links)
- On the Unstable Equilibrium Points and System Separations in Electric Power Systems: A Numerical Study (Q2790428) (← links)
- Security and Formation of Network-Centric Operations (Q2790429) (← links)
- Integral Estimates for the Composition of Green’s and Bounded Operators (Q2790430) (← links)
- A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory (Q2790431) (← links)
- On Geometry of the Zeros of a Polynomial (Q2790432) (← links)
- Approximation by Durrmeyer Type Operators Preserving Linear Functions (Q2790433) (← links)
- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (Q2790434) (← links)
- Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (Q2790435) (← links)
- Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (Q2790437) (← links)
- Advanced Truncated Differential Attacks Against GOST Block Cipher and Its Variants (Q2790438) (← links)
- A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (Q2790439) (← links)
- A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies (Q2790441) (← links)
- Quantum Analogues of Hermite–Hadamard Type Inequalities for Generalized Convexity (Q2790442) (← links)
- A Digital Signature Scheme Based on Two Hard Problems (Q2790443) (← links)
- Randomness in Cryptography (Q2790444) (← links)
- Current Challenges for IT Security with Focus on Biometry (Q2790446) (← links)
- Generalizations of Entropy and Information Measures (Q2790447) (← links)
- Maximal and Variational Principles in Vector Spaces (Q2790448) (← links)
- All Functions $$g: \mathbb{N} \rightarrow \mathbb{N}$$ Which have a Single-Fold Diophantine Representation are Dominated by a Limit-Computable Function $$f: \mathbb{N}\setminus \{0\} \rightarrow \mathbb{N}$$ Which is Implemented in MuPAD and Whose Computa (Q2790449) (← links)
- Image Encryption Scheme Based on Non-autonomous Chaotic Systems (Q2790450) (← links)
- Multiple Parameterize Yang-Hilbert-Type Integral Inequalities (Q2790451) (← links)
- Parameterized Yang–Hilbert-Type Integral Inequalities and Their Operator Expressions (Q2790452) (← links)
- A Secure Communication Design Based on the Chaotic Logistic Map: An Experimental Realization Using Arduino Microcontrollers (Q2790453) (← links)