Filters : "TERADA, ROUTO" Limpar

Filters



Refine with date range


  • Source: Proceedings. Conference title: Latin-American Conference on Communications - LATINCOM. Unidade: IME

    Subjects: APRENDIZADO COMPUTACIONAL, PROTOCOLOS DE COMUNICAÇÃO

    PrivateOnline source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      PAIVA, Thales Bandiera; SIQUEIRA, Yaissa; BATISTA, Daniel Macêdo; HIRATA JÚNIOR, Roberto; TERADA, Routo. BGP anomalies classification using features based on AS relationship graphs. Anais.. Piscataway: IEEE, 2021.Disponível em: DOI: 10.1109/LATINCOM53176.2021.9647824.
    • APA

      Paiva, T. B., Siqueira, Y., Batista, D. M., Hirata Júnior, R., & Terada, R. (2021). BGP anomalies classification using features based on AS relationship graphs. In Proceedings. Piscataway: IEEE. doi:10.1109/LATINCOM53176.2021.9647824
    • NLM

      Paiva TB, Siqueira Y, Batista DM, Hirata Júnior R, Terada R. BGP anomalies classification using features based on AS relationship graphs [Internet]. Proceedings. 2021 ;Available from: https://doi.org/10.1109/LATINCOM53176.2021.9647824
    • Vancouver

      Paiva TB, Siqueira Y, Batista DM, Hirata Júnior R, Terada R. BGP anomalies classification using features based on AS relationship graphs [Internet]. Proceedings. 2021 ;Available from: https://doi.org/10.1109/LATINCOM53176.2021.9647824
  • Source: Proceedings. Conference title: International Conference on Applied Cryptography and Network Security - ACNS. Unidade: IME

    Subjects: CRIPTOLOGIA, SEGURANÇA DE REDES

    Online source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      PAIVA, Thales Bandiera; TERADA, Routo. Cryptanalysis of the binary permuted kernel problem. Anais.. Cham: Springer, 2021.Disponível em: DOI: 10.1007/978-3-030-78375-4_16.
    • APA

      Paiva, T. B., & Terada, R. (2021). Cryptanalysis of the binary permuted kernel problem. In Proceedings. Cham: Springer. doi:10.1007/978-3-030-78375-4_16
    • NLM

      Paiva TB, Terada R. Cryptanalysis of the binary permuted kernel problem [Internet]. Proceedings. 2021 ;Available from: https://doi.org/10.1007/978-3-030-78375-4_16
    • Vancouver

      Paiva TB, Terada R. Cryptanalysis of the binary permuted kernel problem [Internet]. Proceedings. 2021 ;Available from: https://doi.org/10.1007/978-3-030-78375-4_16
  • Source: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Unidade: IME

    Subjects: INFORMÁTICA, CRIPTOLOGIA, COMPUTAÇÃO QUÂNTICA

    Online source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      TERADA, Routo; CÁCERES VILLENA, Reynaldo. Vulnerability: information leakage of reused secret key in NewHope. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Tokyo, 2021. Disponível em: < https://doi.org/10.1587/transfun.2021EAP1048 > DOI: 10.1587/transfun.2021EAP1048.
    • APA

      Terada, R., & Cáceres Villena, R. (2021). Vulnerability: information leakage of reused secret key in NewHope. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. doi:10.1587/transfun.2021EAP1048
    • NLM

      Terada R, Cáceres Villena R. Vulnerability: information leakage of reused secret key in NewHope [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2021 ;Available from: https://doi.org/10.1587/transfun.2021EAP1048
    • Vancouver

      Terada R, Cáceres Villena R. Vulnerability: information leakage of reused secret key in NewHope [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2021 ;Available from: https://doi.org/10.1587/transfun.2021EAP1048
  • Source: Proceedings. Conference title: International Conference on Selected Areas in Cryptography - SAC 2019. Unidade: IME

    Subject: CRIPTOLOGIA

    PrivateOnline source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      PAIVA, Thales Bandiera; TERADA, Routo. A timing attack on the HQC encryption scheme. Anais.. Cham: Springer, 2020.Disponível em: DOI: 10.1007/978-3-030-38471-5_22.
    • APA

      Paiva, T. B., & Terada, R. (2020). A timing attack on the HQC encryption scheme. In Proceedings. Cham: Springer. doi:10.1007/978-3-030-38471-5_22
    • NLM

      Paiva TB, Terada R. A timing attack on the HQC encryption scheme [Internet]. Proceedings. 2020 ;Available from: https://doi.org/10.1007/978-3-030-38471-5_2
    • Vancouver

      Paiva TB, Terada R. A timing attack on the HQC encryption scheme [Internet]. Proceedings. 2020 ;Available from: https://doi.org/10.1007/978-3-030-38471-5_2
  • Source: Anais. Conference title: Escola Regional de Redes de Computadores - ERRC. Unidade: IME

    Subject: GESTÃO DA SEGURANÇA EM SISTEMAS COMPUTACIONAIS

    Versão PublicadaOnline source accessHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      ESCUDERO, Danilo Pereira; ANDRADE, Ewerton Rodrigues; TERADA, Routo. Estudo comparativo do módulo rastreador de scanners de vulnerabilidade web de código aberto. Anais.. Porto Alegre: SBC, 2020.Disponível em: .
    • APA

      Escudero, D. P., Andrade, E. R., & Terada, R. (2020). Estudo comparativo do módulo rastreador de scanners de vulnerabilidade web de código aberto. In Anais. Porto Alegre: SBC. Recuperado de https://errc.sbc.org.br/2020/papers/ST_WRSEG3_3_Comp_Scanners.pdf
    • NLM

      Escudero DP, Andrade ER, Terada R. Estudo comparativo do módulo rastreador de scanners de vulnerabilidade web de código aberto [Internet]. Anais. 2020 ;Available from: https://errc.sbc.org.br/2020/papers/ST_WRSEG3_3_Comp_Scanners.pdf
    • Vancouver

      Escudero DP, Andrade ER, Terada R. Estudo comparativo do módulo rastreador de scanners de vulnerabilidade web de código aberto [Internet]. Anais. 2020 ;Available from: https://errc.sbc.org.br/2020/papers/ST_WRSEG3_3_Comp_Scanners.pdf
  • Source: Proceedings. Conference title: International Conference on Information Security - ISC. Unidade: IME

    Subject: CRIPTOLOGIA

    PrivateOnline source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      PAIVA, Thales Bandiera; NAVARIDAS, Javier; TERADA, Routo. Robust covert channels based on DRAM power consumption. Anais.. Cham: Springer, 2019.Disponível em: DOI: 10.1007/978-3-030-30215-3_16.
    • APA

      Paiva, T. B., Navaridas, J., & Terada, R. (2019). Robust covert channels based on DRAM power consumption. In Proceedings. Cham: Springer. doi:10.1007/978-3-030-30215-3_16
    • NLM

      Paiva TB, Navaridas J, Terada R. Robust covert channels based on DRAM power consumption [Internet]. Proceedings. 2019 ;Available from: http://dx.doi.org/10.1007/978-3-030-30215-3_16
    • Vancouver

      Paiva TB, Navaridas J, Terada R. Robust covert channels based on DRAM power consumption [Internet]. Proceedings. 2019 ;Available from: http://dx.doi.org/10.1007/978-3-030-30215-3_16
  • Source: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Unidade: IME

    Subject: CRIPTOLOGIA

    Versão PublicadaOnline source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      BANDIRA PAIVA, Thales; TERADA, Routo. Improving the efficiency of a reaction attack on the QC-MDPC McEliece. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Tokyo, v. E101.A, n. 10, p. 1676-1686, 2018. Disponível em: < http://dx.doi.org/10.1587/transfun.e101.a.1676 > DOI: 10.1587/transfun.e101.a.1676.
    • APA

      Bandira Paiva, T., & Terada, R. (2018). Improving the efficiency of a reaction attack on the QC-MDPC McEliece. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E101.A( 10), 1676-1686. doi:10.1587/transfun.e101.a.1676
    • NLM

      Bandira Paiva T, Terada R. Improving the efficiency of a reaction attack on the QC-MDPC McEliece [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2018 ; E101.A( 10): 1676-1686.Available from: http://dx.doi.org/10.1587/transfun.e101.a.1676
    • Vancouver

      Bandira Paiva T, Terada R. Improving the efficiency of a reaction attack on the QC-MDPC McEliece [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2018 ; E101.A( 10): 1676-1686.Available from: http://dx.doi.org/10.1587/transfun.e101.a.1676
  • Source: .br. Unidade: IME

    Subjects: GESTÃO DA SEGURANÇA EM SISTEMAS COMPUTACIONAIS, CRIPTOLOGIA

    Versão PublicadaOnline source accessHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      TERADA, Routo. Como fica a segurança na era do computador quântico. [Entrevista]. .br[S.l: s.n.], 2017.Disponível em: .
    • APA

      Terada, R. (2017). Como fica a segurança na era do computador quântico. [Entrevista]. .br. São Paulo. Recuperado de https://nic.br/media/docs/publicacoes/3/revista-br-ano-08-2017-edicao13.pdf
    • NLM

      Terada R. Como fica a segurança na era do computador quântico. [Entrevista] [Internet]. .br. 2017 ; 8( 13): 54-57.Available from: https://nic.br/media/docs/publicacoes/3/revista-br-ano-08-2017-edicao13.pdf
    • Vancouver

      Terada R. Como fica a segurança na era do computador quântico. [Entrevista] [Internet]. .br. 2017 ; 8( 13): 54-57.Available from: https://nic.br/media/docs/publicacoes/3/revista-br-ano-08-2017-edicao13.pdf
  • Source: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Unidade: IME

    Subjects: POLINÔMIOS, SEGURANÇA DE COMPUTADORES, CRIPTOLOGIA

    PrivateOnline source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      TERADA, Routo; ANDRADE, Ewerton Rodrigues. Comparison of two signature schemes based on the MQ problem and quartz. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Tóquio, v. E99.A, n. 12, p. 2527-2538, 2016. Disponível em: < http://dx.doi.org/10.1587/transfun.e99.a.2527 > DOI: 10.1587/transfun.e99.a.2527.
    • APA

      Terada, R., & Andrade, E. R. (2016). Comparison of two signature schemes based on the MQ problem and quartz. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E99.A( 12), 2527-2538. doi:10.1587/transfun.e99.a.2527
    • NLM

      Terada R, Andrade ER. Comparison of two signature schemes based on the MQ problem and quartz [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2016 ; E99.A( 12): 2527-2538.Available from: http://dx.doi.org/10.1587/transfun.e99.a.2527
    • Vancouver

      Terada R, Andrade ER. Comparison of two signature schemes based on the MQ problem and quartz [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2016 ; E99.A( 12): 2527-2538.Available from: http://dx.doi.org/10.1587/transfun.e99.a.2527
  • Source: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Unidade: IME

    Subject: CRIPTOLOGIA

    Online source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      GOYA, Denise Hideko; NAKAMURA, Dionathan; TERADA, Routo. Certificateless key agreement protocols under strong models. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences[S.l.], v. E99.A, n. 10, p. 1822-1832, 2016. Disponível em: < http://dx.doi.org/10.1587/transfun.e99.a.1822 > DOI: 10.1587/transfun.e99.a.1822.
    • APA

      Goya, D. H., Nakamura, D., & Terada, R. (2016). Certificateless key agreement protocols under strong models. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E99.A( 10), 1822-1832. doi:10.1587/transfun.e99.a.1822
    • NLM

      Goya DH, Nakamura D, Terada R. Certificateless key agreement protocols under strong models [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2016 ; E99.A( 10): 1822-1832.Available from: http://dx.doi.org/10.1587/transfun.e99.a.1822
    • Vancouver

      Goya DH, Nakamura D, Terada R. Certificateless key agreement protocols under strong models [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2016 ; E99.A( 10): 1822-1832.Available from: http://dx.doi.org/10.1587/transfun.e99.a.1822
  • Source: IEEE Latin America Transactions. Unidade: IME

    Subject: CRIPTOLOGIA

    Online source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      ANDRADE, Ewerton Rodrigues; TERADA, Routo. Proposal of enhancement for quartz digital signature. IEEE Latin America Transactions, Piscataway, v. 14, n. ju 2016, p. 2951-2963, 2016. Disponível em: < https://doi.org/10.1109/TLA.2016.7555281 > DOI: 10.1109/TLA.2016.7555281.
    • APA

      Andrade, E. R., & Terada, R. (2016). Proposal of enhancement for quartz digital signature. IEEE Latin America Transactions, 14( ju 2016), 2951-2963. doi:10.1109/TLA.2016.7555281
    • NLM

      Andrade ER, Terada R. Proposal of enhancement for quartz digital signature [Internet]. IEEE Latin America Transactions. 2016 ; 14( ju 2016): 2951-2963.Available from: https://doi.org/10.1109/TLA.2016.7555281
    • Vancouver

      Andrade ER, Terada R. Proposal of enhancement for quartz digital signature [Internet]. IEEE Latin America Transactions. 2016 ; 14( ju 2016): 2951-2963.Available from: https://doi.org/10.1109/TLA.2016.7555281
  • Source: Information Security: 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings. Conference title: Information Security Conference - ISC. Unidade: IME

    Subjects: INTELIGÊNCIA ARTIFICIAL, ALGORITMOS E ESTRUTURAS DE DADOS, CRIPTOLOGIA

    Online source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      TERADA, Routo; CÁCERES VILLENA, Reynaldo. Factoring a multiprime modulus N with random bits. Anais.. Cham: Springer, 2015.Disponível em: DOI: 10.1007/978-3-319-27659-5_13.
    • APA

      Terada, R., & Cáceres Villena, R. (2015). Factoring a multiprime modulus N with random bits. In Information Security: 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings. Cham: Springer. doi:10.1007/978-3-319-27659-5_13
    • NLM

      Terada R, Cáceres Villena R. Factoring a multiprime modulus N with random bits [Internet]. Information Security: 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings. 2015 ;Available from: http://dx.doi.org/10.1007/978-3-319-27659-5_13
    • Vancouver

      Terada R, Cáceres Villena R. Factoring a multiprime modulus N with random bits [Internet]. Information Security: 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings. 2015 ;Available from: http://dx.doi.org/10.1007/978-3-319-27659-5_13
  • Source: Progress in Cryptology - LATINCRYPT 2014. Conference title: International Conference on Cryptology and Information Security in Latin America - LATINCRYPT. Unidade: IME

    Subject: CRIPTOLOGIA

    Online source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      NAKAMURA, Dionathan; TERADA, Routo. RSA and elliptic curve least significant bit security. Anais.. Cham: Springer, 2015.Disponível em: DOI: 10.1007/978-3-319-16295-9_8.
    • APA

      Nakamura, D., & Terada, R. (2015). RSA and elliptic curve least significant bit security. In Progress in Cryptology - LATINCRYPT 2014. Cham: Springer. doi:10.1007/978-3-319-16295-9_8
    • NLM

      Nakamura D, Terada R. RSA and elliptic curve least significant bit security [Internet]. Progress in Cryptology - LATINCRYPT 2014. 2015 ;Available from: http://dx.doi.org/10.1007/978-3-319-16295-9_8
    • Vancouver

      Nakamura D, Terada R. RSA and elliptic curve least significant bit security [Internet]. Progress in Cryptology - LATINCRYPT 2014. 2015 ;Available from: http://dx.doi.org/10.1007/978-3-319-16295-9_8
  • Source: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. Unidade: IME

    Subjects: CRIPTOLOGIA, COMPUTABILIDADE E COMPLEXIDADE

    Online source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      MONTEIRO, Fábio S; GOYA, Denise Hideko; TERADA, Routo. Improved identification protocol based on the MQ problem. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Tokyo, v. E98.A, n. 6, p. 1255-1265, 2015. Disponível em: < http://doi.org/10.1587/transfun.E98.A.1255 > DOI: 10.1587/transfun.E98.A.1255.
    • APA

      Monteiro, F. S., Goya, D. H., & Terada, R. (2015). Improved identification protocol based on the MQ problem. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E98.A( 6), 1255-1265. doi:10.1587/transfun.E98.A.1255
    • NLM

      Monteiro FS, Goya DH, Terada R. Improved identification protocol based on the MQ problem [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2015 ; E98.A( 6): 1255-1265.Available from: http://doi.org/10.1587/transfun.E98.A.1255
    • Vancouver

      Monteiro FS, Goya DH, Terada R. Improved identification protocol based on the MQ problem [Internet]. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2015 ; E98.A( 6): 1255-1265.Available from: http://doi.org/10.1587/transfun.E98.A.1255
  • Source: Enigma - Brazilian Journal of Information Security and Cryptography. Unidade: IME

    Subject: CRIPTOLOGIA

    Online source accessHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      ANDRADE, Ewerton Rodrigues; TERADA, Routo. Proposal of enhancement for quartz digital signature. Enigma - Brazilian Journal of Information Security and Cryptography, Brasília, v. 2, n. 1, p. 3-15, 2015. Disponível em: < http://www.enigmajournal.unb.br/index.php/enigma/article/view/35 >.
    • APA

      Andrade, E. R., & Terada, R. (2015). Proposal of enhancement for quartz digital signature. Enigma - Brazilian Journal of Information Security and Cryptography, 2( 1), 3-15. Recuperado de http://www.enigmajournal.unb.br/index.php/enigma/article/view/35
    • NLM

      Andrade ER, Terada R. Proposal of enhancement for quartz digital signature [Internet]. Enigma - Brazilian Journal of Information Security and Cryptography. 2015 ; 2( 1): 3-15.Available from: http://www.enigmajournal.unb.br/index.php/enigma/article/view/35
    • Vancouver

      Andrade ER, Terada R. Proposal of enhancement for quartz digital signature [Internet]. Enigma - Brazilian Journal of Information Security and Cryptography. 2015 ; 2( 1): 3-15.Available from: http://www.enigmajournal.unb.br/index.php/enigma/article/view/35
  • Source: Proceedings. Conference title: Australasian Conference on Information Security - AISC. Unidade: IME

    Subjects: ALGORITMOS, CRIPTOLOGIA

    PrivateOnline source accessHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      TERADA, Routo; UEDA, Eduardo Takeo. A new version of the RC6 algorithm, stronger against χ2 cryptanalysis. Anais.. New York: ACM, 2009.Disponível em: .
    • APA

      Terada, R., & Ueda, E. T. (2009). A new version of the RC6 algorithm, stronger against χ2 cryptanalysis. In Proceedings. New York: ACM. Recuperado de https://dl.acm.org/doi/pdf/10.5555/1862758.1862765
    • NLM

      Terada R, Ueda ET. A new version of the RC6 algorithm, stronger against χ2 cryptanalysis [Internet]. Proceedings. 2009 ;Available from: https://dl.acm.org/doi/pdf/10.5555/1862758.1862765
    • Vancouver

      Terada R, Ueda ET. A new version of the RC6 algorithm, stronger against χ2 cryptanalysis [Internet]. Proceedings. 2009 ;Available from: https://dl.acm.org/doi/pdf/10.5555/1862758.1862765
  • Unidade: IME

    Subjects: COMPUTABILIDADE E COMPLEXIDADE, CRIPTOLOGIA, REDES E COMUNICAÇÃO DE DADOS, SEGURANÇA DE REDES

    How to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      TERADA, Routo. Segurança de dados: criptografia em redes de computador. [S.l: s.n.], 2008.
    • APA

      Terada, R. (2008). Segurança de dados: criptografia em redes de computador. São Paulo: Edgard Blucher.
    • NLM

      Terada R. Segurança de dados: criptografia em redes de computador. 2008 ;
    • Vancouver

      Terada R. Segurança de dados: criptografia em redes de computador. 2008 ;
  • Source: Proceedings. Conference title: International Symposium on Mathematical Morphology and its Applications to Image and Signal Processing. Unidade: IME

    Subjects: PROCESSAMENTO DE IMAGENS, RECONHECIMENTO DE PADRÕES

    Online source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      BARRERA, Júnior; HIRATA JÚNIOR, Roberto; BRUN, Marcel; TERADA, Routo; DOUGHERTY, Edward R. Boosting OCR classifier by optimal edge noise filtering. Anais.. Boston: Springer, 2002.Disponível em: DOI: 10.1007/0-306-47025-X_40.
    • APA

      Barrera, J., Hirata Júnior, R., Brun, M., Terada, R., & Dougherty, E. R. (2002). Boosting OCR classifier by optimal edge noise filtering. In Proceedings. Boston: Springer. doi:10.1007/0-306-47025-X_40
    • NLM

      Barrera J, Hirata Júnior R, Brun M, Terada R, Dougherty ER. Boosting OCR classifier by optimal edge noise filtering [Internet]. Proceedings. 2002 ;Available from: http://dx.doi.org/10.1007/0-306-47025-X_40
    • Vancouver

      Barrera J, Hirata Júnior R, Brun M, Terada R, Dougherty ER. Boosting OCR classifier by optimal edge noise filtering [Internet]. Proceedings. 2002 ;Available from: http://dx.doi.org/10.1007/0-306-47025-X_40
  • Source: Mathematical morphology : proceedings. Conference title: International Symposium on Mathematical Morphology - ISMM. Unidade: IME

    Subjects: PROCESSAMENTO DE IMAGENS, FUNÇÕES BOOLEANAS

    Online source accessHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      HIRATA, Nina Sumiko Tomita; BARRERA, Júnior; TERADA, Routo; DOUGHERTY, Edward R. The incremental splitting of intervals algorithm for the design of binary image operators. Anais.. Collingwood, Victoria [Australia]: CSIRO Publishing, 2002.Disponível em: .
    • APA

      Hirata, N. S. T., Barrera, J., Terada, R., & Dougherty, E. R. (2002). The incremental splitting of intervals algorithm for the design of binary image operators. In Mathematical morphology : proceedings. Collingwood, Victoria [Australia]: CSIRO Publishing. Recuperado de http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=1404C36EB726E1E249BC1ED4633C8F35?doi=10.1.1.92.7351&rep=rep1&type=pdf
    • NLM

      Hirata NST, Barrera J, Terada R, Dougherty ER. The incremental splitting of intervals algorithm for the design of binary image operators [Internet]. Mathematical morphology : proceedings. 2002 ;Available from: http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=1404C36EB726E1E249BC1ED4633C8F35?doi=10.1.1.92.7351&rep=rep1&type=pdf
    • Vancouver

      Hirata NST, Barrera J, Terada R, Dougherty ER. The incremental splitting of intervals algorithm for the design of binary image operators [Internet]. Mathematical morphology : proceedings. 2002 ;Available from: http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=1404C36EB726E1E249BC1ED4633C8F35?doi=10.1.1.92.7351&rep=rep1&type=pdf
  • Source: Proceedings. Conference title: International Conference on Information Security - ISC. Unidade: IME

    Subject: CRIPTOLOGIA

    Online source accessDOIHow to cite
    A citação é gerada automaticamente e pode não estar totalmente de acordo com as normas
    • ABNT

      TERADA, Routo; PINHEIRO, Paulo Geraldo. Quadratic relations for s-boxes: their minimum representations and bounds. Anais.. Berlin: Springer, 2001.Disponível em: DOI: 10.1007/3-540-45439-X_20.
    • APA

      Terada, R., & Pinheiro, P. G. (2001). Quadratic relations for s-boxes: their minimum representations and bounds. In Proceedings. Berlin: Springer. doi:10.1007/3-540-45439-X_20
    • NLM

      Terada R, Pinheiro PG. Quadratic relations for s-boxes: their minimum representations and bounds [Internet]. Proceedings. 2001 ;Available from: https://doi.org/10.1007/3-540-45439-X_20
    • Vancouver

      Terada R, Pinheiro PG. Quadratic relations for s-boxes: their minimum representations and bounds [Internet]. Proceedings. 2001 ;Available from: https://doi.org/10.1007/3-540-45439-X_20

Digital Library of Intellectual Production of Universidade de São Paulo     2012 - 2022