If you are experiencing problems downloading PDF or HTML fulltext, our helpdesk recommend clearing your browser cache and trying again. If you need help in clearing your cache, please click here . Still need help? Email help@ingentaconnect.com

Publisher: Elsevier

Related content
Volume 53, Number 2, 27 January 1995

< previous issue | all issues | next issue >

Favourites:Add to Favourites

A note on the complexity of local search problems
pp. 69-75(7)
Author: Fischer, S.T.

Favourites:Add to Favourites

Low exponent attack against elliptic curve RSA
pp. 77-83(7)
Authors: Kurosawa, K.; Okada, K.; Tsujii, S.

Favourites:Add to Favourites

The interval B-tree
pp. 85-89(5)
Authors: Ang C.-H.; Tan, K.

Favourites:Add to Favourites

Several practical protocols for authentication and key exchange
pp. 91-96(6)
Authors: Lim, C.H.; Lee, P.J.

Favourites:Add to Favourites
Favourites:Add to Favourites

Two attacks on Neuman-Stubblebine authentication protocols
pp. 103-107(5)
Authors: Hwang, T.; Lee, N.; Li, C.; Ko, M.; Chen, Y.

Favourites:Add to Favourites

On the minimum diameter spanning tree problem
pp. 109-111(3)
Authors: Hassin, R.; Tamir, A.

Favourites:Add to Favourites

An algorithm for dynamic data allocation in distributed systems
pp. 113-119(7)
Authors: Wolfson, O.; Jajodia, S.

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more