Proceedings of the Fifth International Conference on Mathematics and Computing: ICMC 2019
No Customer Reviews
On the Design of a Secure Anonymous User Authentication Scheme for Multiple Base Stations-Based Wireless Sensor Networks.- Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows.- Design of Hash Function Using Two Dimensional Cellular Automata.- Anonymous Fine-Grained User Access Control Scheme for Internet of Things Architecture.- Preventing Fault Attack on Stream Ciphers by Fault Detection and Correction.- A Guests Managing System with Lattice-based Verifier-local Revocation Group Signature Scheme with Time-bound keys.- Theory and Application of Computationally Independent One-Way Functions: Interactive Proof of Ability - Revisited.- NCASH: Non-linear Cellular Automata based Hash function.- Conditions for Feedback Shift Registers to Generate Permutations.- A Decision Making Framework for Green Supplier Selection Using FAHP and Taguchi Quality Loss Functions.
ThriftBooks sells millions of used books at the lowest
everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We
deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15.
ThriftBooks.com. Read more. Spend less.