JAIST Repository >

一覧: タイトル

移動先: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
タイトルの先頭数文字を入力して移動:   

検索結果: 1311-1331 / 2073.

前ページ 次ページ
発行日タイトル 著者
May-2014 A Scalable and Secure RFID Ownership Transfer ProtocolMamun, Mohammad Saiful Islam; Miyaji, Atsuko
14-Nov-1995 A scalable disk system with data reconstruction functionsYokota, Haruo; Mimatsu, Yasuyuki; 横田, 治夫; 味松, 康行; ヨコタ, ハルオ; ミマツ, ヤスユキ
9-Aug-2011 Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmeticGoundar, Raveen R.; Joye, Marc; Miyaji, Atsuko; Rivain, Matthieu; Venelli, Alexandre
22-Aug-2009 Scale Free Interval GraphsMiyoshi, Naoto; Shigezumi, Takeya; Uehara, Ryuhei; Watanabe, Osamu
16-Apr-2010 Scale free properties of random k-treesCooper, Colin; Uehara, Ryuhei
1-Sep-2013 Scan Matching Online Cell Decomposition for Coverage Path Planning in an Unknown EnvironmentDugarjav, Batsaikhan; Lee, Soon-Geul; Kim, Donghan; Kim, Jong Hyeong; Chong, Nak Young
31-Jul-2001 A scenario-based object-oriented modeling method with algebraic specification techniquesNakajima, Shin; Futatsugi, Kokichi
17-Feb-2000 Scheduling of parallel identical machines to maximize the weighted numberHiraishi, Kunihiko; Levner, Eugene; Vlach, Milan
30-May-2016 Scheduling overload for real-time systems using SMT solverCheng, Zhuo; Zhang, Haitao; Tan, Yasuo; Lim, Yuto
25-Jul-1997 Second order tangent sets and optimality conditionsCambini, Alberto; Martein, Laura; Vlach, Milan
Aug-2002 A Second-price Sealed-bid Auction with Public VerifiabilityOmote, Kazumasa; Miyaji, Atsuko
2003 A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th RootOmote, Kazumasa; Miyaji, Atsuko
2012 A Secure and private RFID authentication protocol under SLPN problemMamun, Mohammad S. I.; Miyaji, Atsuko; Rahman, Mohammad S.
Aug-2006 Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPAMAMIYA, Hideyo; MIYAJI, Atsuko; MORIMOTO, Hiroaki
Mar-2009 A Secure RFID Authentication Protocol with Low Communication CostRahman, Mohammad Shahriar; Soshi, Masakazu; Miyaji, Atsuko
Mar-2015 Secure sets and defensive alliances in graphs: A faster algorithm and improved boundsAmano, Kazuyuki; Oo, Kyaw May; Otachi, Yota; Uehara, Ryuhei
Jul-2014 Secure VANET Applications with a refined Group SignatureIslam Mamun, Mohammad Saiful; Miyaji, Atsuko
Oct-2008 Security and Access Control for Vehicular CommunicationsZrelli, Saber; Miyaji, Atsuko; Shinoda, Yoichi; Ernst, Thierry
22-May-2016 Security and Experimental Performance Analysis of a Matrix ORAMGordon, Steven; Miyaji, Atsuko; Su, Chunhua; Sumongkaoythin, Karin
Sep-2007 The security of RC6 against asymmetric Chi-square test attackHinoue, Tomohiko; Miyaji, Atsuko; Wada, Takatomi
Oct-2020 Segment-level Effects of Gender, Nationality and Emotion Information on Text-independent Speaker VerificationLi, Kai; Akagi, Masato; Wu, Yibo; Dang, and Jianwu
前ページ 次ページ

 


お問合せ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係 (ir-sys[at]ml.jaist.ac.jp)