5 of 51 articles - Show All
  1. N. J. Daras and M.

    T Rassias Computation Cryptography and network security Springer Online Available httpsbooksgooglecoinbookside4iQCgAAQBAJpgPA601lpgPA601dqhistogramAnalysisandcryptographysourceblotslZvHjEEGRUsigO9BT4wJEOYaiJDilfLxdbwQbYIhlensaXved0ahUKEwjdlaOFlb7NAhXJOo8KHSd4A4kQ6AEIRTAGvonepageqhistogram20Analysis20and20cryptographyffalse Accessed Jun , Volume 23 (2016)
  2. N. D. Jorstad and L.

    Volume 23 (2016)
  3. Goodbye avandia!

    Saudi medical journal , Volume 31 , Issue 12 (2010)
    Alzaid A A
  4. D. R. Stinson, Ed., Advances in Cryptology-Crypto ’ 13th annual international Cryptology conference Santa Barbara, august , proceedings: CRYPTO ’93-13th annual international Cryptology conference, Santa Barbara, august 22-26, Germany: Springer-Verlag Berlin and Heidelberg GmbH & Co. K, .

    Volume 93 (1994)
    California U , California U
  5. P. Millán, L. A. Entrena, and van der Lubbe, "Cryptographically secure pseudo-random bit generator for RFID tags," pp. , Nov. . [Online]. Available: http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=5678035&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D5678035. Accessed: Jun. .

    Volume 23 (2016)
    Peris-Lopez E , Jan C
(No collections found)