Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Article
|
Neural modeling of episodic memory: encoding, retrieval, and forgettingIEEE transaction on neural networks and learning systems, 2012-10, Vol.23 (10), p.1574EISSN: 2162-2388 ;DOI: 10.1109/TNNLS.2012.2208477 ;PMID: 24808003Digital Resources/Online E-Resources |
|
2 |
Material Type: Article
|
Biomechanical ToolKit: Open-source framework to visualize and process biomechanical dataComputer methods and programs in biomedicine, 2014-04, Vol.114 (1), p.80 [Peer Reviewed Journal]Copyright © 2014 Elsevier Ireland Ltd. All rights reserved. ;EISSN: 1872-7565 ;DOI: 10.1016/j.cmpb.2014.01.012 ;PMID: 24548899Digital Resources/Online E-Resources |
|
3 |
Material Type: Article
|
Security and Privacy Aspects of Low-Cost Radio Frequency Identification SystemsLecture notes in computer science, 2004, p.201-212 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2004 ;2004 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 9783540208877 ;ISBN: 3540208879 ;EISSN: 1611-3349 ;EISBN: 9783540398813 ;EISBN: 3540398813 ;DOI: 10.1007/978-3-540-39881-3_18Full text available |
|
4 |
Material Type: Article
|
Memory models of adaptive behaviorIEEE transaction on neural networks and learning systems, 2013-09, Vol.24 (9), p.1437EISSN: 2162-2388 ;DOI: 10.1109/TNNLS.2013.2261545 ;PMID: 24808580Digital Resources/Online E-Resources |
|
5 |
Material Type: Article
|
An adaptive watermarking scheme for e-government document imagesMultimedia tools and applications, 2014-10, Vol.72 (3), p.3085-3103 [Peer Reviewed Journal]Springer Science+Business Media New York 2013 ;2015 INIST-CNRS ;Springer Science+Business Media New York 2014 ;ISSN: 1380-7501 ;EISSN: 1573-7721 ;DOI: 10.1007/s11042-013-1579-5Full text available |
|
6 |
Material Type: Article
|
Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristicDesigns, codes, and cryptography, 2013-10, Vol.69 (1), p.1-52 [Peer Reviewed Journal]Springer Science+Business Media, LLC 2012 ;2014 INIST-CNRS ;Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 0925-1022 ;EISSN: 1573-7586 ;DOI: 10.1007/s10623-012-9617-2Full text available |
|
7 |
Material Type: Article
|
Analysis of Bayesian classification-based approaches for Android malware detectionIET information security, 2014-01, Vol.8 (1), p.25-36 [Peer Reviewed Journal]The Institution of Engineering and Technology ;2020 The Institution of Engineering and Technology ;2015 INIST-CNRS ;ISSN: 1751-8709 ;ISSN: 1751-8717 ;EISSN: 1751-8717 ;DOI: 10.1049/iet-ifs.2013.0095Full text available |
|
8 |
Material Type: Article
|
Using transcoding for hidden communication in IP telephonyMultimedia tools and applications, 2014-06, Vol.70 (3), p.2139-2165 [Peer Reviewed Journal]The Author(s) 2012 ;2015 INIST-CNRS ;Springer Science+Business Media New York 2014 ;ISSN: 1380-7501 ;EISSN: 1573-7721 ;DOI: 10.1007/s11042-012-1224-8Full text available |
|
9 |
Material Type: Conference Proceeding
|
Secure Conjunctive Keyword Search over Encrypted DataApplied Cryptography and Network Security, 2004, p.31-45 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2004 ;2004 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540222170 ;ISBN: 9783540222170 ;EISSN: 1611-3349 ;EISBN: 3540248528 ;EISBN: 9783540248521 ;DOI: 10.1007/978-3-540-24852-1_3Full text available |
|
10 |
Material Type: Article
|
High payload image steganography with reduced distortion using octonary pixel pairing schemeMultimedia tools and applications, 2014-12, Vol.73 (3), p.2223-2245 [Peer Reviewed Journal]Springer Science+Business Media New York 2013 ;2015 INIST-CNRS ;Springer Science+Business Media New York 2014 ;ISSN: 1380-7501 ;EISSN: 1573-7721 ;DOI: 10.1007/s11042-013-1640-4Full text available |
|
11 |
Material Type: Article
|
Active authentication for mobile devices utilising behaviour profilingInternational journal of information security, 2014-06, Vol.13 (3), p.229-244 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2013 ;2015 INIST-CNRS ;Springer-Verlag Berlin Heidelberg 2014 ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.1007/s10207-013-0209-6Full text available |
|
12 |
Material Type: Conference Proceeding
|
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMACAdvances in Cryptology - ASIACRYPT 2004, 2004, p.16-31 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2004 ;2005 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540239758 ;ISBN: 9783540239758 ;EISSN: 1611-3349 ;EISBN: 3540305394 ;EISBN: 9783540305392 ;DOI: 10.1007/978-3-540-30539-2_2Full text available |
|
13 |
Material Type: Article
|
Max-Ratio Relay Selection in Secure Buffer-Aided Cooperative Wireless NetworksIEEE transactions on information forensics and security, 2014-04, Vol.9 (4), p.719-729 [Peer Reviewed Journal]ISSN: 1556-6013 ;EISSN: 1556-6021 ;DOI: 10.1109/TIFS.2014.2307672 ;CODEN: ITIFA6Digital Resources/Online E-Resources |
|
14 |
Material Type: Conference Proceeding
|
Personal Verification Using Palmprint and Hand Geometry BiometricAudio- and Video-Based Biometric Person Authentication, 2003, p.668-678 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2003 ;2004 INIST-CNRS ;ISSN: 0302-9743 ;ISBN: 3540403027 ;ISBN: 9783540403029 ;EISSN: 1611-3349 ;EISBN: 354044887X ;EISBN: 9783540448877 ;DOI: 10.1007/3-540-44887-X_78Full text available |
|
15 |
Material Type: Article
|
Multiclass feature selection with kernel Gram-matrix-based criteriaIEEE transaction on neural networks and learning systems, 2012-10, Vol.23 (10), p.1611EISSN: 2162-2388 ;DOI: 10.1109/TNNLS.2012.2201748 ;PMID: 24808006Digital Resources/Online E-Resources |
|
16 |
Material Type: Article
|
Linguistic steganalysis using the features derived from synonym frequencyMultimedia tools and applications, 2014-08, Vol.71 (3), p.1893-1911 [Peer Reviewed Journal]Springer Science+Business Media New York 2012 ;2015 INIST-CNRS ;Springer Science+Business Media New York 2014 ;ISSN: 1380-7501 ;EISSN: 1573-7721 ;DOI: 10.1007/s11042-012-1313-8Full text available |
|
17 |
Material Type: Article
|
Perceptual DFT watermarking with improved detection and robustness to geometrical distortionsIEEE transactions on information forensics and security, 2014-07, Vol.9 (7), p.1108-1119 [Peer Reviewed Journal]Distributed under a Creative Commons Attribution 4.0 International License ;ISSN: 1556-6013 ;EISSN: 1556-6021 ;DOI: 10.1109/TIFS.2014.2322497Digital Resources/Online E-Resources |
|
18 |
Material Type: Article
|
Identity-based remote data possession checking in public cloudsIET information security, 2014-03, Vol.8 (2), p.114-121 [Peer Reviewed Journal]The Institution of Engineering and Technology ;2020 The Institution of Engineering and Technology ;2015 INIST-CNRS ;ISSN: 1751-8709 ;ISSN: 1751-8717 ;EISSN: 1751-8717 ;DOI: 10.1049/iet-ifs.2012.0271Full text available |
|
19 |
Material Type: Article
|
Alternatives to relational database: comparison of NoSQL and XML approaches for clinical data storageComputer methods and programs in biomedicine, 2013-04, Vol.110 (1), p.99 [Peer Reviewed Journal]Copyright © 2012 Elsevier Ireland Ltd. All rights reserved. ;EISSN: 1872-7565 ;DOI: 10.1016/j.cmpb.2012.10.018 ;PMID: 23177219Digital Resources/Online E-Resources |
|
20 |
Material Type: Article
|
A formalization of card-based cryptographic protocols via abstract machineInternational journal of information security, 2014-02, Vol.13 (1), p.15-23 [Peer Reviewed Journal]Springer-Verlag Berlin Heidelberg 2013 ;2015 INIST-CNRS ;Springer-Verlag Berlin Heidelberg 2014 ;ISSN: 1615-5262 ;EISSN: 1615-5270 ;DOI: 10.1007/s10207-013-0219-4Full text available |