Results 101 to 110 of about 1,939 (202)

PENCARIAN DATA TERENKRIPSI MENGGUNAKAN SKEMA PUBLIC-KEY ENCRYPTION WITH KEYWORD SEARCH [PDF]

open access: yes, 2016
Bagi sebuah perusahaan data merupakan hal yang sangat penting. Suatu kebijakan atau keputusan perusahaan sering kali didasarkan pada data-data. Banyak proses yang dapat dilakukan untuk memelihara data, salahsatunya adalah menyimpannya pada clouds. Namun,
Firdaus, Alex
core  

Perfect Keyword Privacy in PEKS Systems [PDF]

open access: yes, 2012
This paper presents a new security notion, called perfect keyword privacy (PKP), for non-interactive public-key encryption with keyword search (PEKS) [5]. Although the conventional security notion for PEKS guarantees that a searchable ciphertext leaks no information about keywords, it gives no guarantee concerning leakage of a keyword from the trapdoor.
openaire   +1 more source

Physical and dynamical studies of meteors [PDF]

open access: yes
Distribution of meteors in streams detected in the synoptic-year meteor sample plus a study of the fragmentation characteristics of the synoptic-year meteor sample are presented.
Sekanina, Z., Southworth, R. B.
core   +1 more source

On some ground beetles (Carabidae, Coleoptera) from the Republic of Macedonia [PDF]

open access: yes, 2004
Brajković Miloje M.   +2 more
core   +1 more source

Tooth number abnormality: from bench to bedside. [PDF]

open access: yesInt J Oral Sci, 2023
Zhang H   +5 more
europepmc   +1 more source

Epilogue du PEK [PDF]

open access: yesBulletin des Médecins Suisses, 2010
openaire   +1 more source

Singularities and stable homotopy groups of spheres II

open access: yes, 2017
We establish a connection between Morin singularities and stable homotopy groups of spheres. This connection allows us to describe how the images of singularity strata behave around the image of a more complicated stratum.Comment: 31 pages, submitted to ...
Szűcs, A., Terpai, T.
core  

Home - About - Disclaimer - Privacy