-
1
-
-
0028114541
-
Molecular computation of solutions to combinatorial problems
-
L.M. Adleman Molecular computation of solutions to combinational problems Science 266 5187 1994 1021 1024 (Pubitemid 24373714)
-
(1994)
Science
, vol.266
, Issue.5187
, pp. 1021-1024
-
-
Adleman, L.M.1
-
2
-
-
0032926634
-
On applying molecular computation to the data encryption standard
-
L.M. Adleman, P.W.K. Rothemund, S. Roweis, and E. Winfree On applying molecular computation to the Data Encryption Standard Journal of Computational Biology 6 1 1999 53 63 (Pubitemid 29166361)
-
(1999)
Journal of Computational Biology
, vol.6
, Issue.1
, pp. 53-63
-
-
Adleman, L.M.1
Rothemund, P.W.K.2
Roweis, S.3
Winfree, E.4
-
5
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Transactions on Information Theory 1985 469 472
-
(1985)
IEEE Transactions on Information Theory
, pp. 469-472
-
-
Elgamal, T.1
-
8
-
-
62349140029
-
-
December 13-15, 2008, Hainan Island, China 10.1109/FGCN.2008.89
-
M.R. Ogiela, and U. Ogiela Linguistic approach to cryptographic data sharing FGCN 2008 - The 2nd international conference on future generation communication and networking, Vol. 1 December 13-15, 2008, Hainan Island, China 2008 377 380 10.1109/FGCN.2008.89
-
(2008)
Linguistic Approach to Cryptographic Data Sharing FGCN 2008 - The 2nd International Conference on Future Generation Communication and Networking, Vol. 1
, pp. 377-380
-
-
Ogiela, M.R.1
Ogiela, U.2
-
9
-
-
67650606748
-
Security of linguistic threshold schemes in multimedia systems
-
E. Damiani, J. Jeong, R.J. Howlett, L.C. Jain, Springer-Verlag Berlin, Heidelberg
-
M.R. Ogiela, and U. Ogiela Security of linguistic threshold schemes in multimedia systems E. Damiani, J. Jeong, R.J. Howlett, L.C. Jain, New directions in intelligent interactive multimedia systems and services - 2: Studies in computational intelligence Vol. 226 2009 Springer-Verlag Berlin, Heidelberg 13 20
-
(2009)
New Directions in Intelligent Interactive Multimedia Systems and Services - 2: Studies in Computational Intelligence
, vol.226
, pp. 13-20
-
-
Ogiela, M.R.1
Ogiela, U.2
-
10
-
-
73349136579
-
Shadow generation protocol in linguistic threshold schemes
-
D. Ślȩzak, T.-H. Kim, W.-C. Fang, K.P. Arnett, Springer-Verlag Berlin, Heidelberg
-
M.R. Ogiela, and U. Ogiela Shadow generation protocol in linguistic threshold schemes D. Ślȩzak, T.-h. Kim, W.-C. Fang, K.P. Arnett, Security technology: Communication in computer and information science Vol. 58 2009 Springer-Verlag Berlin, Heidelberg 35 42
-
(2009)
Security Technology: Communication in Computer and Information Science
, vol.58
, pp. 35-42
-
-
Ogiela, M.R.1
Ogiela, U.2
-
11
-
-
77955715077
-
The use of mathematical linguistic methods in creating secret sharing threshold algorithms
-
M.R. Ogiela, and U. Ogiela The use of mathematical linguistic methods in creating secret sharing threshold algorithms Computers and Mathematics with Applications 60 2 2010 267 271
-
(2010)
Computers and Mathematics with Applications
, vol.60
, Issue.2
, pp. 267-271
-
-
Ogiela, M.R.1
Ogiela, U.2
-
17
-
-
15944409593
-
Simple secret sharing and threshold RSA signature schemes
-
S. Tang Simple secret sharing and threshold RSA signature schemes Journal of Information and Computational Science 1 2004 259 262 (Pubitemid 40443231)
-
(2004)
Journal of Information and Computational Science
, vol.1
, Issue.2
, pp. 259-262
-
-
Tang, S.1
-
18
-
-
33748938054
-
New field of cryptography: DNA cryptography
-
DOI 10.1007/s11434-006-2012-5
-
G. Xiao, M. Lu, L. Qin, and X. Lai New field of cryptography: DNA cryptography Chinese Science Bulletin 51 12 2006 1413 1420 (Pubitemid 44432186)
-
(2006)
Chinese Science Bulletin
, vol.51
, Issue.12
, pp. 1413-1420
-
-
Xiao, G.1
Lu, M.2
Qin, L.3
Lai, X.4
|