| Publication | Date of Publication | Type |
|---|
Some active attacks on fast server-aided secret computation protocols for modular exponentiation Cryptography: Policy and Algorithms | 2019-10-10 | Paper |
Cryptanalysis on an improved version of ElGamal-like public-key encryption scheme for encrypting large messages | 2013-06-11 | Paper |
An efficient and sensitive decision tree approach to mining concept-drifting data streams | 2009-01-28 | Paper |
Designing a classifier by a layered multi-population genetic programming approach Pattern Recognition | 2007-05-23 | Paper |
Simple authenticated key agreement and protected password change protocol Computers & Mathematics with Applications | 2005-08-05 | Paper |
A new blind signature based on the discrete logarithm problem for untraceability Applied Mathematics and Computation | 2005-06-13 | Paper |
An improvement on the Lin-Wu \((t,n)\) threshold verifiable multi-secret sharing scheme Applied Mathematics and Computation | 2005-05-04 | Paper |
Learning effective classifiers with \(Z\)-value measure based on genetic programming Pattern Recognition | 2004-11-22 | Paper |
PARALLEL COMPUTATION OF THE MODULAR CASCADE EXPONENTIATION Parallel Algorithms and Applications | 2004-10-06 | Paper |
scientific article; zbMATH DE number 1998329 (Why is no real title available?) | 2004-02-18 | Paper |
scientific article; zbMATH DE number 1954410 (Why is no real title available?) | 2003-07-28 | Paper |
scientific article; zbMATH DE number 2028682 (Why is no real title available?) | 2003-01-01 | Paper |
Integration of relations with conflicting schema structures in heterogeneous database systems Data & Knowledge Engineering | 1999-01-12 | Paper |
Multilevel secure database encryption with subkeys Data & Knowledge Engineering | 1998-07-23 | Paper |
Some properties of optimal cartesian product files for orthogonal range queries Information Sciences | 1998-02-25 | Paper |
Using multilevel hierarchical registration strategy for mobility management Information Sciences | 1997-09-04 | Paper |
Authenticated encryption schemes with message linkage Information Processing Letters | 1997-02-27 | Paper |
Some properties of vectorial addition chains† International Journal of Computer Mathematics | 1996-05-28 | Paper |
scientific article; zbMATH DE number 761918 (Why is no real title available?) | 1995-06-08 | Paper |
Refining imprecise data by integrity constraints Data & Knowledge Engineering | 1994-10-04 | Paper |
scientific article; zbMATH DE number 527369 (Why is no real title available?) | 1994-09-11 | Paper |
Concurrent operations in multi-attribute linear hashing Information Sciences | 1994-01-26 | Paper |
Manipulating multiple stacks with ordered-heap Information Sciences | 1994-01-13 | Paper |
Finding a complete matching with the maximum product on weighted bipartite graphs Computers & Mathematics with Applications | 1993-06-29 | Paper |
Analysis of the multigroup method for manipulating multiple stacks Computers & Mathematics with Applications | 1993-06-29 | Paper |
Amortized analysis of some disk scheduling algorithms: SSTF, SCAN, and \(N\)-step SCAN BIT | 1993-01-26 | Paper |
The worst case analysis of algorithm on multiple stacks manipulation Information Processing Letters | 1993-01-17 | Paper |
Performance analysis of stack space allocation based upon random walk model International Journal of Computer Mathematics | 1993-01-16 | Paper |
Random filter and its analysis* International Journal of Computer Mathematics | 1992-09-27 | Paper |
scientific article; zbMATH DE number 62655 (Why is no real title available?) | 1992-09-27 | Paper |
2d random filter and analysis∗ International Journal of Computer Mathematics | 1992-06-28 | Paper |
Hierarchical spanning trees and distributing on incomplete hypercubes Parallel Computing | 1991-01-01 | Paper |
scientific article; zbMATH DE number 4206056 (Why is no real title available?) | 1991-01-01 | Paper |
Concurrent operations in linear hashing Information Sciences | 1990-01-01 | Paper |