Search results for: Amparo Fúster-Sabater
Finite Fields and Their Applications > 2017 > 47 > Complete > 222-241
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > Workshop on Modeling Complex Systems (MCS 2006) > 577-585
Lecture Notes in Computer Science > Parallel Processing and Applied Mathematics > Evolutionary Computing, Meta-Heuristics and Neural Networks > 499-508
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2007 > General Track > 597-610
Lecture Notes in Computer Science > Cellular Automata > Codes and Cryptography with Cellular Automata > 251-260
Lecture Notes in Computer Science > Cellular Automata > 612-621
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2011 > General Tracks > 563-572
Lecture Notes in Computer Science > Computer Aided Systems Theory – EUROCAST 2005 > Cryptography and Spectral Analysis > 355-364
Lecture Notes in Computer Science > Computational Science and Its Applications - ICCSA 2006 > General Tracks > 1035-1043
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Internet Comunications Security (WICS) Workshop > 719-728
Lecture Notes in Computer Science > Computer and Information Sciences – ISCIS 2006 > Security and Cryptography > 1011-1020
Lecture Notes in Computer Science > Adaptive and Natural Computing Algorithms > Systems Theory > 285-294
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2010 > General Track on Advanced and Emerging Applications > 586-596
Lecture Notes in Computer Science > Theoretical Computer Science > Security and Cryptography > 329-341
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2009 > Workshop on Internet Communication Security (WICS 2009) > 145-154
Lecture Notes in Computer Science > Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices > Embedded Systems > 332-339