Springer, 0-387, 1-85233, 0-8176, 1-84628

Central database

Publisher

  1. Published

    Advanced Topology Optimization Methods for Conceptual Architectural Design. / Aage, Niels; Amir, Oded; Clausen, Anders; Hadar, Lior ; Maier, Dana ; Søndergaard, Asbjørn .

    Advances in Architectural Geometry 2014. ed. / P. Block; J. Knippers; N.J. Mitra; W. Wang. Springer, 2014.

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  2. Published

    Enabling short fragments for uncoordinated spread spectrum communication. / Ahmed, Naveed; Pöpper, Christina; Capkun, Srdjan.

    Computer Security - ESORICS 2014: 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I. Springer, 2014. p. 488-507 (Lecture Notes in Computer Science, Vol. 8712).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  3. Published

    Polymers for Fuel Cells. / Aili, David; Jensen, Jens Oluf; Li, Qingfeng.

    Encyclopedia of Polymeric Nanomaterials. Springer, 2014.

    Publication: Research - peer-reviewEncyclopedia chapter – Annual report year: 2014

  4. Published

    Lazy Modulus Switching for the BKW Algorithm on LWE. / Albrecht, Martin Roland; Faugère, Jean-Charles; Fitzpatrick, Robert; Perret, Ludovic.

    Public-Key Cryptography – PKC 2014: Proceedings. Springer, 2014. p. 429-445 (Lecture Notes in Computer Science, Vol. 8383).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  5. Published

    On the Efficacy of Solving LWE by Reduction to Unique-SVP. / Albrecht, Martin Roland; Fitzpatrick, Robert; Göpfert, Florian .

    Information Security and Cryptology - ICISC 2013. Revised Selected Papers. Springer, 2014. p. 293–310 (Lecture Notes in Computer Science, Vol. 8565).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  6. Published

    Cryptanalysis of SIMON Variants with Connections. / Alizadeh, Javad; Alkhzaimi, Hoda A.; Aref, Mohammad Reza; Bagheri, Nasour; Gauravaram, Praveen; Kumar, Abhishek; Lauridsen, Martin Mehl; Sanadhya, Somitra Kumar.

    Proceedings of the 10th International Workshop on Radio Frequency Identification Security and Privacy Issues, RFIDSec 2014: Revised Selected Papers. ed. / Nitesh Saxena; Ahmad-Reza Sadeghi. Springer, 2014. p. 90-107 (Lecture Notes in Computer Science; No. 8651).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  7. Published

    A System for Computing Conceptual Pathways in Bio-medical Text Models. / Andreasen, Troels; Bulskov, Henrik; Nilsson, Jørgen Fischer; Jensen, Per Anker.

    Foundations of Intelligent Systems. ed. / Troels Andreasen; Henning Christiansen; Juan-Carlos Cubero; Zbigniew W. Ras. Springer, 2014. p. 264-273 (Lecture Notes in Computer Science, Vol. 8502).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  8. Published

    Domain Theory, Its Models and Concepts. / Andreasen, Mogens Myrup; Howard, Thomas J.; Bruun, Hans Peter Lomholt.

    An Anthology of Theories and Models of Design: Philosophy, Approaches and Empirical Explorations. ed. / A. Chakrabarti; L.T.M. Blessing. Springer, 2014. p. 173-195.

    Publication: Research - peer-reviewBook chapter – Annual report year: 2014

  9. Published

    How to Securely Release Unverified Plaintext in Authenticated Encryption. / Andreeva, Elena; Bogdanov, Andrey; Luykx, Atul; Mennink, Bart; Mouha, Nicky; Yasuda, Kan.

    Advances in Cryptology – ASIACRYPT 2014: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security - Part I. ed. / Palash Sarkar; Tetsu Iwata. Springer, 2014. p. 105-125 (Lecture Notes in Computer Science; No. 8873).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

  10. Published

    Towards understanding the known-key security of block ciphers. / Andreeva, Elena; Bogdanov, Andrey; Mennink, Bart.

    Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers. ed. / Shiho Moria. Springer, 2014. p. 348-366 (Lecture Notes in Computer Science, Vol. 8424).

    Publication: Research - peer-reviewArticle in proceedings – Annual report year: 2014

Previous 1 2 3 4 5 6 7 8 ...99 Next
Download list:
Download as PDF
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
PDF
Download as HTML
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
HTML
Download as Word
Select render style:
APAAuthorCBE/CSEHarvardMLAStandardVancouverShortLong
Word