THE SECRET KEYS OF ISRAEL - FRENCH - GRAD,AD

被引:0
|
作者
REIX, A
机构
来源
关键词
D O I
暂无
中图分类号
B [哲学、宗教];
学科分类号
01 ; 0101 ;
摘要
引用
收藏
页码:456 / 457
页数:2
相关论文
共 50 条
  • [31] The Secret Life of Keys: On the Calculation of Mechanical Lock Systems
    Vomel, Christof
    de Lorenzi, Flavio
    Beer, Samuel
    Fuchs, Erwin
    SIAM REVIEW, 2017, 59 (02) : 393 - 422
  • [32] Enhancing MANET Security using Secret Public Keys
    Eissa, Tameem
    Abd Razak, Shukor
    Ngadi, Md Asri
    INTERNATIONAL CONFERENCE ON FUTURE NETWORKS, PROCEEDINGS, 2009, : 130 - 134
  • [33] Robust Transmission over Wiretap Channels with Secret Keys
    Schaefer, Rafael F.
    Poor, H. Vincent
    CONFERENCE RECORD OF THE 2014 FORTY-EIGHTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, 2014, : 60 - 64
  • [34] Highly Randomized Image Steganography using Secret Keys
    Dagar, Sunny
    2014 RECENT ADVANCES AND INNOVATIONS IN ENGINEERING (ICRAIE), 2014,
  • [35] Tighter Bounds on Entropy of Secret Keys in Authentication Codes
    Shikata, Junji
    2017 IEEE INFORMATION THEORY WORKSHOP (ITW), 2017, : 259 - 263
  • [36] Secure Broadcasting of a Common Message with Independent Secret Keys
    Schaefer, Rafael F.
    Khisti, Ashish
    2014 48TH ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2014,
  • [37] SECRET DISTRIBUTION OF KEYS FOR PUBLIC-KEY SYSTEMS
    QUISQUATER, JJ
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 293 : 203 - 208
  • [38] SSeCloud: Using secret sharing scheme to secure keys
    Hu, Liang
    Huang, Yang
    Yang, Disheng
    Zhang, Yuzhen
    Liu, Hengchang
    2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017), 2017, 81
  • [39] Israel's open-secret trade
    Rotunno, Lorenzo
    Vezina, Pierre-Louis
    REVIEW OF WORLD ECONOMICS, 2017, 153 (02) : 233 - 248
  • [40] Double secret keys and double random numbers authentication scheme
    Tian Junfeng
    Jiao-Hongqiang
    Ning, Li
    Tao, Liu
    CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 708 - 711