Search results
2016 IEEE Security and Privacy Workshops (SPW) > 118 - 125
Lecture Notes in Computer Science > Bioinformatics Research and Development > Session 11: Databases, Web and Text Analysis > 464-479
Lecture Notes in Computer Science > CONCUR '90 Theories of Concurrency: Unification and Extension > 99-114
Lecture Notes in Computer Science > Advances in Knowledge Discovery and Data Mining > Session 3A. Pattern Mining > 300-309
Lecture Notes in Computer Science > Security Aspects in Information Technology > Cipher Primitives > 181-185
Lecture Notes in Computer Science > Declarative Programming for Knowledge Management > Frontier Technologies > 25-37
Lecture Notes in Computer Science > Sequences and Their Applications – SETA 2006 > Topics in Complexities of Sequences > 168-179
Lecture Notes in Computer Science > Sequences and Their Applications - SETA 2008 > Correlation > 71-80
Lecture Notes in Computer Science > General Theory of Information Transfer and Combinatorics > Language Evolution – Pattern Discovery – Reconstructions > 814-830
Lecture Notes in Computer Science > Sequences and Their Applications – SETA 2010 > Hadamard Matrices and Transforms > 253-258
Lecture Notes in Computer Science > Fast Software Encryption > Stream Ciphers and Block Ciphers > 40-54
IET Signal Processing > 2016 > 10 > 2 > 140 - 149
Electronics Letters > 2016 > 52 > 5 > 367 - 369