Filtros : "Indexado no Science Citation Index" "CRIPTOLOGIA" Removidos: "Indexado no Metadex" "bg" "AeroSense '97" Limpar

Filtros



Limitar por data


  • Fonte: Connection Science. Unidade: ICMC

    Assuntos: COMPUTAÇÃO EM NUVEM, RECUPERAÇÃO DA INFORMAÇÃO, CRIPTOLOGIA

    PrivadoAcesso à fonteDOIComo citar
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      XIAO, Tingting et al. Multi-keyword ranked search based on mapping set matching in cloud ciphertext storage system. Connection Science, v. 33, n. 1, p. 95-112, 2021Tradução . . Disponível em: https://doi.org/10.1080/09540091.2020.1753175. Acesso em: 28 set. 2024.
    • APA

      Xiao, T., Han, D., He, J., Li, K. -C., & Mello, R. F. de. (2021). Multi-keyword ranked search based on mapping set matching in cloud ciphertext storage system. Connection Science, 33( 1), 95-112. doi:10.1080/09540091.2020.1753175
    • NLM

      Xiao T, Han D, He J, Li K-C, Mello RF de. Multi-keyword ranked search based on mapping set matching in cloud ciphertext storage system [Internet]. Connection Science. 2021 ; 33( 1): 95-112.[citado 2024 set. 28 ] Available from: https://doi.org/10.1080/09540091.2020.1753175
    • Vancouver

      Xiao T, Han D, He J, Li K-C, Mello RF de. Multi-keyword ranked search based on mapping set matching in cloud ciphertext storage system [Internet]. Connection Science. 2021 ; 33( 1): 95-112.[citado 2024 set. 28 ] Available from: https://doi.org/10.1080/09540091.2020.1753175
  • Fonte: International Journal of Data Warehousing and Mining. Unidade: ICMC

    Assuntos: BANCO DE DADOS DISTRIBUÍDOS, COMPUTAÇÃO EM NUVEM, SEGURANÇA DE REDES, CRIPTOLOGIA, BENCHMARKS

    Acesso à fonteDOIComo citar
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      LOPES, Claudivan Cruz et al. An encryption methodology for enabling the use of data warehouses on the cloud. International Journal of Data Warehousing and Mining, v. 14, n. 4, p. 38-66, 2018Tradução . . Disponível em: https://doi.org/10.4018/IJDWM.2018100103. Acesso em: 28 set. 2024.
    • APA

      Lopes, C. C., Times, V. C., Matwin, S., Ciferri, C. D. de A., & Ciferri, R. R. (2018). An encryption methodology for enabling the use of data warehouses on the cloud. International Journal of Data Warehousing and Mining, 14( 4), 38-66. doi:10.4018/IJDWM.2018100103
    • NLM

      Lopes CC, Times VC, Matwin S, Ciferri CD de A, Ciferri RR. An encryption methodology for enabling the use of data warehouses on the cloud [Internet]. International Journal of Data Warehousing and Mining. 2018 ; 14( 4): 38-66.[citado 2024 set. 28 ] Available from: https://doi.org/10.4018/IJDWM.2018100103
    • Vancouver

      Lopes CC, Times VC, Matwin S, Ciferri CD de A, Ciferri RR. An encryption methodology for enabling the use of data warehouses on the cloud [Internet]. International Journal of Data Warehousing and Mining. 2018 ; 14( 4): 38-66.[citado 2024 set. 28 ] Available from: https://doi.org/10.4018/IJDWM.2018100103
  • Fonte: Communications in Nonlinear Science and Numerical Simulation. Unidade: IFSC

    Assuntos: CRIPTOLOGIA, SISTEMAS DINÂMICOS

    Acesso à fonteDOIComo citar
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      MACHICAO, Jeaneth et al. A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems. Communications in Nonlinear Science and Numerical Simulation, v. 29, n. 1-3, p. 102-115, 2015Tradução . . Disponível em: https://doi.org/10.1016/j.cnsns.2015.01.022. Acesso em: 28 set. 2024.
    • APA

      Machicao, J., Baetens, J. M., Marco, A. G., De Baets, B., & Bruno, O. M. (2015). A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems. Communications in Nonlinear Science and Numerical Simulation, 29( 1-3), 102-115. doi:10.1016/j.cnsns.2015.01.022
    • NLM

      Machicao J, Baetens JM, Marco AG, De Baets B, Bruno OM. A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems [Internet]. Communications in Nonlinear Science and Numerical Simulation. 2015 ; 29( 1-3): 102-115.[citado 2024 set. 28 ] Available from: https://doi.org/10.1016/j.cnsns.2015.01.022
    • Vancouver

      Machicao J, Baetens JM, Marco AG, De Baets B, Bruno OM. A dynamical systems approach to the discrimination of the modes of operation of cryptographic systems [Internet]. Communications in Nonlinear Science and Numerical Simulation. 2015 ; 29( 1-3): 102-115.[citado 2024 set. 28 ] Available from: https://doi.org/10.1016/j.cnsns.2015.01.022
  • Fonte: Expert Systems with Applications. Unidade: IFSC

    Assuntos: AUTÔMATOS CELULARES, CRIPTOLOGIA, ALGORITMOS

    Acesso à fonteDOIComo citar
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      MACHICAO, Jeaneth e MARCO, Anderson G. e BRUNO, Odemir Martinez. Chaotic encryption method based on life-like cellular automata. Expert Systems with Applications, v. No 2012, n. 16, p. 12626-12635, 2012Tradução . . Disponível em: https://doi.org/10.1016/j.eswa.2012.05.020. Acesso em: 28 set. 2024.
    • APA

      Machicao, J., Marco, A. G., & Bruno, O. M. (2012). Chaotic encryption method based on life-like cellular automata. Expert Systems with Applications, No 2012( 16), 12626-12635. doi:10.1016/j.eswa.2012.05.020
    • NLM

      Machicao J, Marco AG, Bruno OM. Chaotic encryption method based on life-like cellular automata [Internet]. Expert Systems with Applications. 2012 ; No 2012( 16): 12626-12635.[citado 2024 set. 28 ] Available from: https://doi.org/10.1016/j.eswa.2012.05.020
    • Vancouver

      Machicao J, Marco AG, Bruno OM. Chaotic encryption method based on life-like cellular automata [Internet]. Expert Systems with Applications. 2012 ; No 2012( 16): 12626-12635.[citado 2024 set. 28 ] Available from: https://doi.org/10.1016/j.eswa.2012.05.020
  • Fonte: International Journal of Modern Physics C. Unidades: FFCLRP, IFSC

    Assuntos: CAOS (SISTEMAS DINÂMICOS), ATRATORES, DECRIPTOLOGIA, CRIPTOLOGIA, CIÊNCIA DA COMPUTAÇÃO

    Acesso à fonteDOIComo citar
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      MARCO, Anderson Gonçalves e MARTINEZ, Alexandre Souto e BRUNO, Odemir Martinez. Fast, parallel and secure cryptography algorithm using Loren'z attractor. International Journal of Modern Physics C, v. 21, n. 3, p. 365-382, 2010Tradução . . Disponível em: https://doi.org/10.1142/S0129183110015166. Acesso em: 28 set. 2024.
    • APA

      Marco, A. G., Martinez, A. S., & Bruno, O. M. (2010). Fast, parallel and secure cryptography algorithm using Loren'z attractor. International Journal of Modern Physics C, 21( 3), 365-382. doi:10.1142/S0129183110015166
    • NLM

      Marco AG, Martinez AS, Bruno OM. Fast, parallel and secure cryptography algorithm using Loren'z attractor [Internet]. International Journal of Modern Physics C. 2010 ; 21( 3): 365-382.[citado 2024 set. 28 ] Available from: https://doi.org/10.1142/S0129183110015166
    • Vancouver

      Marco AG, Martinez AS, Bruno OM. Fast, parallel and secure cryptography algorithm using Loren'z attractor [Internet]. International Journal of Modern Physics C. 2010 ; 21( 3): 365-382.[citado 2024 set. 28 ] Available from: https://doi.org/10.1142/S0129183110015166

Biblioteca Digital de Produção Intelectual da Universidade de São Paulo     2012 - 2024