Skip to main content

Publisher: Elsevier

Volume 53, Number 2, 27 January 1995

Favourites:
ADD

A note on the complexity of local search problems
pp. 69-75(7)
Author: Fischer, S.T.

Favourites:
ADD

Low exponent attack against elliptic curve RSA
pp. 77-83(7)
Authors: Kurosawa, K.; Okada, K.; Tsujii, S.

Favourites:
ADD

The interval B-tree
pp. 85-89(5)
Authors: Ang C.-H.; Tan, K.

Favourites:
ADD

Several practical protocols for authentication and key exchange
pp. 91-96(6)
Authors: Lim, C.H.; Lee, P.J.

Favourites:
ADD
Favourites:
ADD

Two attacks on Neuman-Stubblebine authentication protocols
pp. 103-107(5)
Authors: Hwang, T.; Lee, N.; Li, C.; Ko, M.; Chen, Y.

Favourites:
ADD

On the minimum diameter spanning tree problem
pp. 109-111(3)
Authors: Hassin, R.; Tamir, A.

Favourites:
ADD

An algorithm for dynamic data allocation in distributed systems
pp. 113-119(7)
Authors: Wolfson, O.; Jajodia, S.

Favourites:
ADD

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more