skip to main content
Language:
Search Limited to: Search Limited to: Resource type Show Results with: Show Results with: Search type Index

Results 1 - 20 of 1,859  for All Library Resources

Results 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Neural modeling of episodic memory: encoding, retrieval, and forgetting
Material Type:
Article
Add to My Research

Neural modeling of episodic memory: encoding, retrieval, and forgetting

IEEE transaction on neural networks and learning systems, 2012-10, Vol.23 (10), p.1574

EISSN: 2162-2388 ;DOI: 10.1109/TNNLS.2012.2208477 ;PMID: 24808003

Digital Resources/Online E-Resources

2
Biomechanical ToolKit: Open-source framework to visualize and process biomechanical data
Material Type:
Article
Add to My Research

Biomechanical ToolKit: Open-source framework to visualize and process biomechanical data

Computer methods and programs in biomedicine, 2014-04, Vol.114 (1), p.80 [Peer Reviewed Journal]

Copyright © 2014 Elsevier Ireland Ltd. All rights reserved. ;EISSN: 1872-7565 ;DOI: 10.1016/j.cmpb.2014.01.012 ;PMID: 24548899

Digital Resources/Online E-Resources

3
Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems
Material Type:
Article
Add to My Research

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

Lecture notes in computer science, 2004, p.201-212 [Peer Reviewed Journal]

Springer-Verlag Berlin Heidelberg 2004 ;2004 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 9783540208877 ;ISBN: 3540208879 ;EISSN: 1611-3349 ;EISBN: 9783540398813 ;EISBN: 3540398813 ;DOI: 10.1007/978-3-540-39881-3_18

Full text available

4
Memory models of adaptive behavior
Material Type:
Article
Add to My Research

Memory models of adaptive behavior

IEEE transaction on neural networks and learning systems, 2013-09, Vol.24 (9), p.1437

EISSN: 2162-2388 ;DOI: 10.1109/TNNLS.2013.2261545 ;PMID: 24808580

Digital Resources/Online E-Resources

5
An adaptive watermarking scheme for e-government document images
Material Type:
Article
Add to My Research

An adaptive watermarking scheme for e-government document images

Multimedia tools and applications, 2014-10, Vol.72 (3), p.3085-3103 [Peer Reviewed Journal]

Springer Science+Business Media New York 2013 ;2015 INIST-CNRS ;Springer Science+Business Media New York 2014 ;ISSN: 1380-7501 ;EISSN: 1573-7721 ;DOI: 10.1007/s11042-013-1579-5

Full text available

6
Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic
Material Type:
Article
Add to My Research

Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic

Designs, codes, and cryptography, 2013-10, Vol.69 (1), p.1-52 [Peer Reviewed Journal]

Springer Science+Business Media, LLC 2012 ;2014 INIST-CNRS ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0925-1022 ;EISSN: 1573-7586 ;DOI: 10.1007/s10623-012-9617-2

Full text available

7
Analysis of Bayesian classification-based approaches for Android malware detection
Material Type:
Article
Add to My Research

Analysis of Bayesian classification-based approaches for Android malware detection

IET information security, 2014-01, Vol.8 (1), p.25-36 [Peer Reviewed Journal]

The Institution of Engineering and Technology ;2020 The Institution of Engineering and Technology ;2015 INIST-CNRS ;ISSN: 1751-8709 ;ISSN: 1751-8717 ;EISSN: 1751-8717 ;DOI: 10.1049/iet-ifs.2013.0095

Full text available

8
Using transcoding for hidden communication in IP telephony
Material Type:
Article
Add to My Research

Using transcoding for hidden communication in IP telephony

Multimedia tools and applications, 2014-06, Vol.70 (3), p.2139-2165 [Peer Reviewed Journal]

The Author(s) 2012 ;2015 INIST-CNRS ;Springer Science+Business Media New York 2014 ;ISSN: 1380-7501 ;EISSN: 1573-7721 ;DOI: 10.1007/s11042-012-1224-8

Full text available

9
Secure Conjunctive Keyword Search over Encrypted Data
Material Type:
Conference Proceeding
Add to My Research

Secure Conjunctive Keyword Search over Encrypted Data

Applied Cryptography and Network Security, 2004, p.31-45 [Peer Reviewed Journal]

Springer-Verlag Berlin Heidelberg 2004 ;2004 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540222170 ;ISBN: 9783540222170 ;EISSN: 1611-3349 ;EISBN: 3540248528 ;EISBN: 9783540248521 ;DOI: 10.1007/978-3-540-24852-1_3

Full text available

10
High payload image steganography with reduced distortion using octonary pixel pairing scheme
Material Type:
Article
Add to My Research

High payload image steganography with reduced distortion using octonary pixel pairing scheme

Multimedia tools and applications, 2014-12, Vol.73 (3), p.2223-2245 [Peer Reviewed Journal]

Springer Science+Business Media New York 2013 ;2015 INIST-CNRS ;Springer Science+Business Media New York 2014 ;ISSN: 1380-7501 ;EISSN: 1573-7721 ;DOI: 10.1007/s11042-013-1640-4

Full text available

11
Active authentication for mobile devices utilising behaviour profiling
Material Type:
Article
Add to My Research

Active authentication for mobile devices utilising behaviour profiling

International journal of information security, 2014-06, Vol.13 (3), p.229-244 [Peer Reviewed Journal]

Springer-Verlag Berlin Heidelberg 2013 ;2015 INIST-CNRS ;Springer-Verlag Berlin Heidelberg 2014 ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.1007/s10207-013-0209-6

Full text available

12
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
Material Type:
Conference Proceeding
Add to My Research

Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC

Advances in Cryptology - ASIACRYPT 2004, 2004, p.16-31 [Peer Reviewed Journal]

Springer-Verlag Berlin Heidelberg 2004 ;2005 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540239758 ;ISBN: 9783540239758 ;EISSN: 1611-3349 ;EISBN: 3540305394 ;EISBN: 9783540305392 ;DOI: 10.1007/978-3-540-30539-2_2

Full text available

13
Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks
Material Type:
Article
Add to My Research

Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless Networks

IEEE transactions on information forensics and security, 2014-04, Vol.9 (4), p.719-729 [Peer Reviewed Journal]

ISSN: 1556-6013 ;EISSN: 1556-6021 ;DOI: 10.1109/TIFS.2014.2307672 ;CODEN: ITIFA6

Digital Resources/Online E-Resources

14
Personal Verification Using Palmprint and Hand Geometry Biometric
Material Type:
Conference Proceeding
Add to My Research

Personal Verification Using Palmprint and Hand Geometry Biometric

Audio- and Video-Based Biometric Person Authentication, 2003, p.668-678 [Peer Reviewed Journal]

Springer-Verlag Berlin Heidelberg 2003 ;2004 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540403027 ;ISBN: 9783540403029 ;EISSN: 1611-3349 ;EISBN: 354044887X ;EISBN: 9783540448877 ;DOI: 10.1007/3-540-44887-X_78

Full text available

15
Multiclass feature selection with kernel Gram-matrix-based criteria
Material Type:
Article
Add to My Research

Multiclass feature selection with kernel Gram-matrix-based criteria

IEEE transaction on neural networks and learning systems, 2012-10, Vol.23 (10), p.1611

EISSN: 2162-2388 ;DOI: 10.1109/TNNLS.2012.2201748 ;PMID: 24808006

Digital Resources/Online E-Resources

16
Linguistic steganalysis using the features derived from synonym frequency
Material Type:
Article
Add to My Research

Linguistic steganalysis using the features derived from synonym frequency

Multimedia tools and applications, 2014-08, Vol.71 (3), p.1893-1911 [Peer Reviewed Journal]

Springer Science+Business Media New York 2012 ;2015 INIST-CNRS ;Springer Science+Business Media New York 2014 ;ISSN: 1380-7501 ;EISSN: 1573-7721 ;DOI: 10.1007/s11042-012-1313-8

Full text available

17
Perceptual DFT watermarking with improved detection and robustness to geometrical distortions
Material Type:
Article
Add to My Research

Perceptual DFT watermarking with improved detection and robustness to geometrical distortions

IEEE transactions on information forensics and security, 2014-07, Vol.9 (7), p.1108-1119 [Peer Reviewed Journal]

Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1556-6013 ;EISSN: 1556-6021 ;DOI: 10.1109/TIFS.2014.2322497

Digital Resources/Online E-Resources

18
Identity-based remote data possession checking in public clouds
Material Type:
Article
Add to My Research

Identity-based remote data possession checking in public clouds

IET information security, 2014-03, Vol.8 (2), p.114-121 [Peer Reviewed Journal]

The Institution of Engineering and Technology ;2020 The Institution of Engineering and Technology ;2015 INIST-CNRS ;ISSN: 1751-8709 ;ISSN: 1751-8717 ;EISSN: 1751-8717 ;DOI: 10.1049/iet-ifs.2012.0271

Full text available

19
Alternatives to relational database: comparison of NoSQL and XML approaches for clinical data storage
Material Type:
Article
Add to My Research

Alternatives to relational database: comparison of NoSQL and XML approaches for clinical data storage

Computer methods and programs in biomedicine, 2013-04, Vol.110 (1), p.99 [Peer Reviewed Journal]

Copyright © 2012 Elsevier Ireland Ltd. All rights reserved. ;EISSN: 1872-7565 ;DOI: 10.1016/j.cmpb.2012.10.018 ;PMID: 23177219

Digital Resources/Online E-Resources

20
A formalization of card-based cryptographic protocols via abstract machine
Material Type:
Article
Add to My Research

A formalization of card-based cryptographic protocols via abstract machine

International journal of information security, 2014-02, Vol.13 (1), p.15-23 [Peer Reviewed Journal]

Springer-Verlag Berlin Heidelberg 2013 ;2015 INIST-CNRS ;Springer-Verlag Berlin Heidelberg 2014 ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.1007/s10207-013-0219-4

Full text available

Results 1 - 20 of 1,859  for All Library Resources

Results 1 2 3 4 5 next page

Personalize your results

  1. Edit

Refine Search Results

Expand My Results

  1.   

Refine My Results

Creation Date 

From To
  1. Before 1988  (25)
  2. 1988 To 1993  (26)
  3. 1994 To 1999  (100)
  4. 2000 To 2006  (1,384)
  5. After 2006  (325)
  6. More options open sub menu

Resource Type 

  1. Conference Proceedings  (833)
  2. Articles  (587)
  3. Book Chapters  (439)
  4. More options open sub menu

Searching Remote Databases, Please Wait