共 50 条
- [42] Knowledge Representation and Data Fusion for archaeology : The case study of the castle of shawbak 9TH INTERNATIONAL CONFERENCE ON COMPUTER GRAPHICS AND ARTIFICIAL INTELLIGENCE, 2006, : 169 - 179
- [43] Towards policies for data insertion in dynamic data driven application systems: a case study sudden changes in wildland fire ICCS 2010 - INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, PROCEEDINGS, 2010, 1 (01): : 1261 - 1270
- [45] Cryptographic signals: Requirements, methods of synthesis, properties, application in telecommunication systems Gorbenko, I.D. (gorbenkoi@iit.kharkov.ua), 1600, Begell House Inc. (76): : 1079 - 1100
- [46] Cryptographic Randomness on a CC2538: a Case Study 2016 8TH IEEE INTERNATIONAL WORKSHOP ON INFORMATION FORENSICS AND SECURITY (WIFS 2016), 2016,
- [47] Using SMV for cryptographic protocol analysis: A case study FCS '05: Proceedings of the 2005 International Conference on Foundations of Computer Science, 2005, : 150 - 153
- [48] Using SMV for cryptographic protocol analysis: A case study Operating Systems Review (ACM), 2001, 35 (02): : 43 - 50
- [50] Automatic detection of attacks on cryptographic protocols: A case study DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 69 - 84