If you are experiencing problems downloading PDF or HTML fulltext, our helpdesk recommend clearing your browser cache and trying again. If you need help in clearing your cache, please click here . Still need help? Email help@ingentaconnect.com

Publisher: Elsevier

Related content
Volume 53, Number 2, 27 January 1995

< previous issue | all issues | next issue >

Favourites:Add to Favourites

A note on the complexity of local search problems
pp. 69-75(7)
Author: Fischer, S.T.

Favourites:Add to Favourites

Low exponent attack against elliptic curve RSA
pp. 77-83(7)
Authors: Kurosawa, K.; Okada, K.; Tsujii, S.

Favourites:Add to Favourites

The interval B-tree
pp. 85-89(5)
Authors: Ang C.-H.; Tan, K.

Favourites:Add to Favourites

Several practical protocols for authentication and key exchange
pp. 91-96(6)
Authors: Lim, C.H.; Lee, P.J.

Favourites:Add to Favourites
Favourites:Add to Favourites

Two attacks on Neuman-Stubblebine authentication protocols
pp. 103-107(5)
Authors: Hwang, T.; Lee, N.; Li, C.; Ko, M.; Chen, Y.

Favourites:Add to Favourites

On the minimum diameter spanning tree problem
pp. 109-111(3)
Authors: Hassin, R.; Tamir, A.

Favourites:Add to Favourites

An algorithm for dynamic data allocation in distributed systems
pp. 113-119(7)
Authors: Wolfson, O.; Jajodia, S.

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more