The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for CRT with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1965-1974 (17) 1975-1978 (16) 1979-1987 (22) 1988-1993 (18) 1994-1996 (16) 1997-1999 (24) 2000-2001 (30) 2002 (16) 2003 (18) 2004 (18) 2005 (18) 2006 (24) 2007 (21) 2008 (30) 2009 (22) 2010 (17) 2011-2012 (40) 2013 (18) 2014 (19) 2015-2016 (24) 2017-2018 (27) 2019 (60) 2020 (16) 2021 (18) 2022 (20) 2023-2024 (15)
Publication types (Num. hits)
article(233) data(3) incollection(2) inproceedings(342) phdthesis(3) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 346 occurrences of 205 keywords

Results
Found 586 publication records. Showing 584 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
132Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Factorization attack, Fault infective CRT, Cryptography, Chinese remainder theorem (CRT), Residue number system, Hardware fault cryptanalysis
126Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis
111Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Permanent Fault Attack on the Parameters of RSA with CRT. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
111Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Hardware Fault Attackon RSA with CRT Revisited. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
102Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack
90Ethan Hadar, Irit Hadar The composition refactoring triangle (CRT) practical toolkit: from spaghetti to lasagna. Search on Bibsonomy OOPSLA Companion The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anti-patterns, architecture centric evolution, design, tracking, requirements, methodology, refactoring, traceability
88ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Smart card, RSA, Side channel attack, DPA, CRT, Fault attack
87Santanu Sarkar 0001, Subhamoy Maitra Partial Key Exposure Attack on CRT-RSA. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
78Katsuyuki Okeya, Tsuyoshi Takagi Security analysis of CRT-based cryptosystems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem
78Sining Liu, Brian King, Wei Wang 0003 A CRT-RSA Algorithm Secure against Hardware Fault Attacks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF algorithm, smart card, RSA, Chinese Remainder Theorem
78Katsuyuki Okeya, Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem
78Yuxiu Cao, Chunxiao Xing, Long Tang, Lizhu Zhou A New CSCW Prototype System for Color CRT CAD/CAM. Search on Bibsonomy CSCWD The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
73Shaoqiang Bi, Warren J. Gross The Mixed-Radix Chinese Remainder Theorem and Its Applications to Residue Comparison. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
66Baodong Qin, Ming Li, Fanyu Kong Cryptanalysis of a Type of CRT-Based RSA Algorithms. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BOS scheme, cryptanalysis, RSA, Chinese remainder theorem, fault attack, LLL
66Wu Woan Kim, Sang-Dong Jang Multiplier with Parallel CSA Using CRT's Specific Moduli (2k-1, 2k , 2k+1). Search on Bibsonomy ICCSA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
66Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert A new CRT-RSA algorithm secure against bellcore attacks. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, smartcards, Chinese remainder theorem, faults attacks, Bellcore attack
66Blair MacIntyre, William B. Cowan A Practical Approach to Calculating Luminance Contrast on a CRT. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
64Ellen Jochemsz, Alexander May 0001 A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF small exponents, Coppersmith’s method, cryptanalysis, RSA, CRT
64Bert den Boer, Kerstin Lemke, Guntram Wicke A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction
63Masako Omori, Satoshi Hasegawa, Tomoyuki Watanabe, Kazuhiro Fujikake, Masaru Miyao Comparison of Measurement of Accommodation between LCD and CRT at the Stereoscopic Vision Gaze. Search on Bibsonomy HCI (13) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF binocular and natural viewing, LCD and CRT, display, Accommodation, stereoscopic image
63Emmanuelle Dottax, Christophe Giraud 0001, Matthieu Rivain, Yannick Sierra On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Second Order, CRT-RSA, Fault Attacks, Countermeasure
63Johannes Blömer, Martin Otto 0002 Wagner's Attack on a Secure CRT-RSA Algorithm Reconsidered. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CRT-RSA, BOS-Scheme, Wagner’s attack, smartcards, fault attacks
60Yonghong Yang, Zine Abid, Wei Wang 0003, Z. Zhang, C. Yang Efficient multi-prime RSA immune against hardware fault attack. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
58B. Parvatha Varthini, S. Valli An Enhanced One Way Function Tree Rekey Protocol Based on Chinese Remainder Theorem. Search on Bibsonomy ISCIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF GKC, Logical key Graph, OFT, CRT, Group key, Rekeying
54Chong Hee Kim, Jean-Jacques Quisquater Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
54ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, Sung-Ming Yen, Sung-Hyun Kim A CRT-Based RSA Countermeasure Against Physical Cryptanalysis. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
54Steve Langer, Brian J. Bartholmai, Kenneth A. Fetterly, Scott Harmsen, William J. Ryan, Bradley James Erickson, Katherine P. Andriole, John A. Carrino SCAR R&D Symposium 2003: Comparing the Efficacy of 5-MP CRT Versus 3-MP LCD in the Evaluation of Interstitial Lung Disease. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2004 DBLP  DOI  BibTeX  RDF kappa, interstitial lung disease, image quality, displays, ROC, receiver operating characteristic
54Elizabeth A. Krupinski, Jeffrey Johnson, Hans Roehrig, John Nafziger, Jiahua Fan, Jeffrey Lubin Use of a Human Visual System Model to Predict Observer Performance with CRT vs LCD Display of Images. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2004 DBLP  DOI  BibTeX  RDF observer performance, digital display, Vision model
48Shreyas Sundaram, Christoforos N. Hadjicostis Fault-Tolerant Convolution Via Chinese Remainder Codes Constructed From Non-Coprime Moduli. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Rui Gong, Kui Dai, Zhiying Wang 0003 Transient Fault Recovery on Chip Multiprocessor based on Dual Core Redundancy and Context Saving. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Crt Lozej Spectral Form Factor and Dynamical Localization. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Crt Gerlec, Gordana Rakic, Zoran Budimac, Marjan Hericko A programming language independent framework for metrics-based software evolution and analysis. Search on Bibsonomy Comput. Sci. Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
43Andrej Krajnc, Marjan Hericko, Crt Gerlec, Uros Goljat, Gregor Polancic Experimental investigation of the quality and productivity of software factories based development. Search on Bibsonomy Comput. Sci. Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
43Zoran Budimac, Gordana Rakic, Marjan Hericko, Crt Gerlec Towards the Better Software Metrics Tool. Search on Bibsonomy CSMR The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
43Crt Gerlec, Marjan Hericko Analyzing Structural Software Changes: A Case Study. Search on Bibsonomy BCI (Local) The full citation details ... 2012 DBLP  BibTeX  RDF
42Nicolas Duchateau, Mathieu De Craene, Etel Silva, Marta Sitges, Bart H. Bijnens, Alejandro F. Frangi Septal Flash Assessment on CRT Candidates Based on Statistical Atlases of Motion. Search on Bibsonomy MICCAI (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Yu-Chen Kuo, Chih-Nung Chen CRT-MAC: A Power-Saving Multicast Protocol in the Asynchronous Ad Hoc Networks. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ad hoc network, Multicast, Chinese Remainder Theorem, Power-Saving
42Alexandre Berzati, Cécile Canovas, Louis Goubin In(security) Against Fault Injection Attacks for CRT-RSA Implementations. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Sylvain Tourancheau, Patrick Le Callet, Dominique Barba Impact of the Resolution on the Difference of Perceptual Video Quality Between CRT and LCD. Search on Bibsonomy ICIP (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Daniel Bleichenbacher, Alexander May 0001 New Attacks on RSA with Small Secret CRT-Exponents. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF small exponents, Coppersmith’s method, RSA, lattices
42Chiara Del Frate, Alexia Bestagno, Viviana Londero, Raffaella Pozzi Mucelli, Valerio Salomoni, Massimo Bazzocchi Comparison Between CRT and LCD Displays for Full-Field-Digital-Mammography (FFDM) Interpretation. Search on Bibsonomy Digital Mammography / IWDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Hirofumi Muratani Optimization and Evaluation of Randomized c-Secure CRT Code Defined on Polynomial Ring. Search on Bibsonomy Information Hiding The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Hajime Watanabe, Takashi Kitagawa An ID Coding Scheme for Fingerprinting, Randomized c-Secure CRT Code. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Jean-Sébastien Coron, Christophe Giraud 0001, Nicolas Morin, Gilles Piret, David Vigilant Fault Attacks and Countermeasures on Vigilant's RSA-CRT Algorithm. Search on Bibsonomy FDTC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF CRT-RSA, Fault Attacks
39Richard Conway 0001, John S. Nelson Fast Converter for 3 Moduli RNS Using New Property of CRT. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Residue number system (RNS) converter, Chinese remainder theorem (CRT)
36Kamer Kaya, Ali Aydin Selçuk A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF joint random secret sharing, Asmuth-Bloom secret sharing scheme, Chinese Remainder Theorem, Verifiability
36Furong Wang, Yasha Liu, Lai Tu, Peng Zhang Analysis of User Mobility Effects on Packet Level Performances in Next Generation Mobile Communication Networks. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF packet level performance, call level performance, user mobility, cell residence time
36Kamer Kaya, Ali Aydin Selçuk Robust Threshold Schemes Based on the Chinese Remainder Theorem. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Paillier, robustness, RSA, Chinese Remainder Theorem, Threshold cryptography, ElGamal
36Rami Rom, Jacob Erel, Michael Glikson, Randy A. Lieberman, Kobi Rosenblum, Ofer Binah, Ran Ginosar, David L. Hayes 0001 Adaptive Cardiac Resynchronization Therapy Device Based on Spiking Neurons Architecture and Reinforcement Learning Scheme. Search on Bibsonomy IEEE Trans. Neural Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36B. Parvatha Varthini, S. Valli Generation of Group Key Using Enhanced One Way Function Tree Group Rekey Protocol. Search on Bibsonomy ICCTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Jari Takatalo, Jukka Häkkinen, Jeppe Komulainen, Heikki Särkelä, Göte Nyman The impact of the display type and content to a game adaptation. Search on Bibsonomy Mobile HCI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mobile display, user experience, digital games
36Ren-Junn Hwang, Feng-Fu Su, Yi-Shiung Yeh, Chia-Yao Chen An Efficient Decryption Method for RSA Cryptosystem. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Piet Claus, Bart H. Bijnens, Ole-Alexander Breithardt, George R. Sutherland Why Ischemic Hearts Respond Less to Cardiac Resynchronisation Therapy. A Modeling Study. Search on Bibsonomy FIMH The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Mohamed A. Gomaa, Chad Scarbrough, Irith Pomeranz, T. N. Vijaykumar Transient-Fault Recovery for Chip Multiprocessors. Search on Bibsonomy ISCA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Hanae Nozaki, Masahiko Motoyama, Atsushi Shimbo, Shin-ichi Kawamura Implementation of RSA Algorithm Based on RNS Montgomery Multiplication. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF RSA cryptography, residue number systems, Montgomery multiplication, modular exponentiation
36Janusz Konrad, Bertrand Lacotte, Eric Dubois 0002 Cancellation of image crosstalk in time-sequential displays of stereoscopic video. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
36Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Hiroaki Kikuchi, Kensuke Abe, Shohachiro Nakanishi Performance Evaluation of Public-Key Certificate Revocation System with Balanced Hash Tree. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Walter A. Fischer The synergistic combination of an oscilloscope and a microprocessor. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1975 DBLP  DOI  BibTeX  RDF
36Juan Francisco Gomez, Beatriz Trénor, Rafael Sebastián Prediction of CRT Activation Sequence by Personalization of Biventricular Models from Electroanatomical Maps. Search on Bibsonomy STACOM@MICCAI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Svyatoslav Khamzin, Arsenii Dokuchaev, Olga Solovyova Prediction of CRT Response on Personalized Computer Models. Search on Bibsonomy STACOM@MICCAI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Oscar Camara 0001 Best (and Worst) Practices for Organizing a Challenge on Cardiac Biophysical Models During AI Summer: The CRT-EPiggy19 Challenge. Search on Bibsonomy STACOM@MICCAI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
36Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi CRT-KPS: A Key Predistribution Schemes Using CRT. Search on Bibsonomy ACISP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
34Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion
34Petra Wohlmacher Digital certificates: a survey of revocation methods. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF CRS, CRT, revocation, digital certificate, CRL, public-key certificate, X.509, attribute certificate, OCSP
33Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews Chinese remainder theorem based group key management. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chinese remaindering group key (CRGK), congruence system, fast Chinese remaindering group key (FCRGK), protocol, Chinese remainder theorem (CRT), group key management
33Amarpreet S. Chawla, Hans Roehrig, Jeffrey J. Rodriguez, Jiahua Fan Determining the MTF of Medical Imaging Displays Using Edge Techniques. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cathode ray tube (CRT), liquid crystal display (LCD), modulation transfer function (MTF), edge-spread function (ESF), line-spread function (LSF), Gans' method, low-pass differentiator, image quality
30Martin Hlavác Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem
30Arnaud Boscher, Robert Naciri, Emmanuel Prouff CRT RSA Algorithm Protected Against Fault Attacks. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart Card, RSA, Chinese Remainder Theorem, Fault Attacks, Simple Power Analysis, Modular Exponentiation
30Chong Hee Kim, Jean-Jacques Quisquater How can we overcome both side channel analysis and fault attacks on RSA-CRT? Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30David A. Wagner 0001 Cryptanalysis of a provably secure CRT-RSA algorithm. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, chinese remainder theorem, fault attacks
30Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard Attacking Unbalanced RSA-CRT Using SPA. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Markus G. Kuhn Optical Time-Domain Eavesdropping Risks of CRT Displays. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF optical compromising emanations, cathode-ray tubes, phosphor decay, computer security, TEMPEST
30Christian Aumüller, Peter Bier, Wieland Fischer, Peter Hofreiter, Jean-Pierre Seifert Fault Attacks on RSA with CRT: Concrete Results and Practical Countermeasures. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Spike attacks, Software countermeasures, Transient fault model, RSA, Chinese Remainder Theorem, Fault attacks, Hardware security, Bellcore attack
30John Whiting, Sandy Newman Microprocessors in CRT terminals. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1975 DBLP  DOI  BibTeX  RDF
24Giuseppe Campobello, Alessandro Leonardi, Sergio Palazzo A novel reliable and energy-saving forwarding technique for wireless sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2009 DBLP  DOI  BibTeX  RDF packet splitting, reliability, energy efficiency
24Maxime Sermesant, Florence Billet, Radomír Chabiniok, Tommaso Mansi, Phani Chinchapatnam, Philippe Moireau, Jean-Marc Peyrat, Kawal S. Rhode, Matthew Ginks, Pier Lambiase, Simon R. Arridge, Hervé Delingette, Michel Sorine, C. Aldo Rinaldi, Dominique Chapelle, Reza Razavi, Nicholas Ayache Personalised Electromechanical Model of the Heart for the Prediction of the Acute Effects of Cardiac Resynchronisation Therapy. Search on Bibsonomy FIMH The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Nan Jiang 0009, John Kim, William J. Dally Indirect adaptive routing on large scale interconnection networks. Search on Bibsonomy ISCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dragonfly, routing, interconnection networks
24Shyong Jian Shyu, Ying-Ru Chen Threshold Secret Image Sharing by Chinese Remainder Theorem. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Xin Liu, Xiaoxia Wan Display Color Management and Soft Proofing. Search on Bibsonomy CSSE (6) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Min Huang, Hao-Xue Liu, Ning-Fang Liao Comparative Study of Just-Noticeable Color Differences Using Reflective and Self-Luminous Color Stimuli. Search on Bibsonomy CSSE (6) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Takashi Watanabe, Hiroto Nagayoshi, Hiroshi Sako A Display Technique for Preventing Electromagnetic Eavesdropping Using Color Mixture Characteristic of Human Eyes. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Compromising Emanation, Side Channel Ana- lysis, Electromagnetic Radiation, TEMPEST
24Ponnurangam Kumaraguru, Yong Rhee, Steve Sheng, Sharique Hasan, Alessandro Acquisti, Lorrie Faith Cranor, Jason I. Hong Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. Search on Bibsonomy eCrime Researchers Summit The full citation details ... 2007 DBLP  DOI  BibTeX  RDF embedded training, instructional principles, learning science, email, phishing, situated learning, usable privacy and security
24Masako Omori, Satoshi Hasegawa, Masaru Miyao, Masami Choui, Hiroshi Tamura Brain Activities Related to Legibility of Text, Studied by Means of Near Infrared Spectroscopy. Search on Bibsonomy HCI (8) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF visual observation, tap a button, operate a mobile phone, text entry, human interface, near infrared spectroscopy, brain activities
24M. S. Sricharan, Vaidehi V. A Pragmatic Analysis of User Mobility Patterns in Macrocellular Wireless Networks. Search on Bibsonomy WOWMOM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Roy Kerckhoffs, Andrew D. McCulloch, Jeffrey H. Omens, Lawrence J. Mulligan Effect of Pacing Site and Infarct Location on Regional Mechanics and Global Hemodynamics in a Model Based Study of Heart Failure. Search on Bibsonomy FIMH The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hemodynamics, 3D electromechanics, ventricular pacing, mechanics
24Hui-Feng Huang, Chin-Chen Chang 0001 An Efficient Key-Lock-Pair Mechanism Based on Division Algorithm. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Bonseok Koo, Dongwook Lee, Gwonho Ryu, Taejoo Chang, Sangjin Lee 0002 High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Booth’s algorithm, RSA, Chinese Remainder Theorem, Montgomery multiplication, Carry Save Adder
24Pramod Kumar Meher, Jagdish Chandra Patra A new approach to secure distributed storage, sharing and dissemination of digital image. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Tom Kimpe, Albert Xthona, Paul Matthijs, Lode De Paepe Solution for Nonuniformities and Spatial Noise in Medical LCD Displays by Using Pixel-Based Correction. Search on Bibsonomy J. Digit. Imaging The full citation details ... 2005 DBLP  DOI  BibTeX  RDF noise, mammography, compensation, pixel, uniformity, medical, LCD
24Heng Huang, Li Shen 0001, Fillia Makedon, Sheng Zhang 0004, Mark Greenberg, Ling Gao, Justin D. Pearlman A clustering-based approach for prediction of cardiac resynchronization therapy. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cardiac resynchronization therapy, computer assisted diagnosis and prognosis, data mining, clustering
24Heng Huang, Li Shen 0001, Rong Zhang, Fillia Makedon, Bruce Hettleman, Justin D. Pearlman A Prediction Framework for Cardiac Resynchronization Therapy Via 4D Cardiac Motion Analysis. Search on Bibsonomy MICCAI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Malrey Lee, Eun-Ser Lee, HeeJo Kang, HeeSook Kim An Expert System Development for Operating Procedure Monitoring of PWR Plants. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF general operating procedures, PWR, Expert systems, knowledge bases
24Patrick Ledda, Greg Ward, Alan Chalmers A wide field, high dynamic range, stereographic viewer. Search on Bibsonomy GRAPHITE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF dynamic range, tone reproduction
24Wieland Fischer, Jean-Pierre Seifert Note on Fast Computation of Secret RSA Exponents. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Carmichael's $lambda$-function, Secret exponent, Short public key, RSA, Chinese Remainder Theorem, Key generation
24Chung-Hsien Wu, Jin-Hua Hong, Cheng-Wen Wu RSA cryptosystem design based on the Chinese remainder theorem. Search on Bibsonomy ASP-DAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Johann Großschädl The Chinese Remainder Theorem and its Application in a High-Speed RSA Crypto Chip. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA/spl gamma/ crypto-chip, RSA encryption scheme, hardware performance, long-integer modular arithmetic, private key operations, multiplier architecture, high-speed hardware accelerator, reconfigurable multiplier datapath, word-serial multiplier, modular reduction method, multiplier core, decryption rate, 200 MHz, 560 kbit/s, 2 Mbit/s, parallelism, pipelining, public key cryptography, reconfigurable architectures, clocks, Chinese Remainder Theorem, microprocessor chips, multiplying circuits, modular multiplications, modular exponentiations, pipeline arithmetic, clock frequency
24Radu I. Campeanu, John D. McFall Colour monitor calibration based on CIE standards. Search on Bibsonomy CASCON The full citation details ... 1993 DBLP  BibTeX  RDF
24Mike Stokes, Mark D. Fairchild, Roy S. Berns Precision Requirements for Digital Color Reproduction. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF color science, image science, color, color reproduction, color correction
Displaying result #1 - #100 of 584 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license