Items where Subject is "QA150-272.5 Algebra"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: B | C | G | K | P | S | Y
Number of items at this level: 11.

B

Bashier, Housam Khalifa and Lau, Siong Hoe and Liew, Tze Hui and Abdullah, Mohd Fikri Azli and Pang, Ying Han and Wee, Kouk Kwee and Sayeed, Md. Shohel (2016) Texture classification via extended local graph structure. Optik - International Journal for Light and Electron Optics, 127 (2). pp. 638-643. ISSN 0030-4026

C

Chin, Ji Jian and Mohamad, Moesfa Soeheila (2020) Improved Indistinguishability for Searchable Symmetric Encryption. In: Provable and Practical Security. Lecture Notes in Computer Science, 12505 . Springer Science and Business Media Deutschland GmbH, International Conference on Provable Security, pp. 190-212. ISBN 9783030625757

Chin, Ji Jian and Poh, Geong Sen and Mohamad, Moesfa Soeheila (2018) Searchable symmetric encryption over multiple servers. Cryptography and Communications, 10 (1). pp. 139-158. ISSN 1936-2447

G

Geethamma, V. G. and Gopinath, Deepa P. and Daniel, Jacob K. (2021) Complex Numbers and Rhythmic Changes. Resonance, 26 (8). pp. 1059-1080. ISSN 0971-8044

K

Kabir, Sohag and Kumar, Mohit and Tan, Kim Geok and Hossain, Ferdous and Yazdi, Mohammad (2020) A Method for Temporal Fault Tree Analysis Using Intuitionistic Fuzzy Set and Expert Elicitation. IEEE Access, 8. pp. 980-996. ISSN 2169-3536

Kim, Jongsung and Wu, Hongjun and Phan, Raphael Chung Wei (2018) Cryptography and Future Security. Discrete Applied Mathematics, 241. p. 1. ISSN 0166-218X

P

Prakasam, P. and Madheswaran, M. and Sujith, K. P. and Sayeed, Md. Shohel (2021) An Enhanced Energy Efficient Lightweight Cryptography Method for various IoT devices. ICT Express. pp. 1-6. ISSN 2405-9595 (In Press)

S

Salagean, Ana and Winter, R. and Mandache-Salagean, Matei and Phan, Raphael Chung Wei (2016) Higher order differentiation over finite fields with applications to generalising the cube attack. Designs, Codes and Cryptography, 84 (3). pp. 425-449. ISSN 0925-1022

See, John Su Yang and Li, Yuxi and Lin, Weiyao and Xu, Ning and Xu, Shugong and Yan, Ke and Yang, Cong (2020) CFAD: Coarse-to-Fine Action Detector for Spatiotemporal Action Localization. In: CFAD: Coarse-to-Fine Action Detector for Spatiotemporal Action Localization. Springer Science and Business Media Deutschland GmbH, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 510-527. ISBN 9783030585167

Y

Yap, Wun She and Heng, Swee Huay and Goi, Bok Min (2018) Security analysis of M-DES and key-based coded permutation ciphers in wireless channels. IET Communications, 12 (10). pp. 1230-1235. ISSN 1751-8628

Yee, Jian Chew and Shih, Yin Ooi and Ying, Han Pang (2020) Experimental Exploratory of Temporal Sampling Forest in Forest Fire Regression and Classification. In: 2020 8th International Conference on Information and Communication Technology (ICoICT), 24.06.2020, Virtual Conference, Yogyakarta, Indonesia.

This list was generated on Sun Oct 17 20:23:09 2021 +08.