Theory and Applications of Cellular Automata in Cryptography
IEEE Transactions on Computers
Satchel: providing access to any document, any time, anywhere
ACM Transactions on Computer-Human Interaction (TOCHI) - Special issue on human-computer interaction with mobile systems
The Satchel system architecture: mobile access to documents and services
Mobile Networks and Applications
Mental poker game based on a bit commitment scheme through network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Topics in the theory of DNA computing
Theoretical Computer Science - Natural computing
A Functional Cryptosystem Using a Group Action
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Privacy Protection for Transactions of Digital Goods
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Random Number Generation with +-NFAs
CIAA '01 Revised Papers from the 6th International Conference on Implementation and Application of Automata
Caesar and DNA. Views on Cryptology
FCT '99 Proceedings of the 12th International Symposium on Fundamentals of Computation Theory
Fast modular exponentiation of large numbers with large exponents
Journal of Systems Architecture: the EUROMICRO Journal
Theoretical Computer Science
Protocols that hide user's preferences in electronic transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
International Journal of High Performance Computing and Networking
Protocol completion incentive problems in cryptographic Vickrey auctions
Electronic Commerce Research
International Journal of Computer Mathematics
Protocols that hide user's preferences in electronic transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Public-key cryptosystems based on composite degree residuosity classes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
An efficient derivation method for DTOL systems and a measure of derivation complexity
Journal of Automata, Languages and Combinatorics
Automatic management of forums via artificial immune systems
International Journal of Autonomous and Adaptive Communications Systems
ECvisual: a visualization tool for elliptic curve based ciphers
Proceedings of the 43rd ACM technical symposium on Computer Science Education
Proceedings of the Fifth International Conference on Security of Information and Networks
RSAvisual: a visualization tool for the RSA cipher
Proceedings of the 45th ACM technical symposium on Computer science education
Hi-index | 0.00 |