DSpace DSpace UPC
 Català   Castellano   English  

E-prints UPC >
Informàtica >
MAK - Matemàtica Aplicada a la Criptografia >


MAK - Matemàtica Aplicada a la Criptografia

Articles de revista : [18]

Cerca a aquesta col·lecció:


 




Llista per 
Subscriviu-vos per rebre un correu electrònic cada vegada que s'introdueixi un nou ítem en aquesta col·lecció.
Vista preliminarDataTítolAutor(s)
cropping_euler_factors.pdf.jpgset-2013Cropping Euler factors of modular L-functionsGonzález Rovira, Josep; Jiménez Urroz, Jorge; Lario Loyo, Joan Carles
set-2012More hybrid and secure protection of statistical data setsHerranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc
fields_definition_torsion_points.pdf.jpgjun-2011On fields of definition of torsion points of elliptic curves with complex multiplicationDieulefait, Luis Victor; Gonzalez Jimenez, Enrique; Jiménez Urroz, Jorge
2011Kd-trees and the real disclosure risks of large statistical databasesHerranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc
05601718.pdf.jpg14-oct-2010Optimal symbol alignment distance: a new distance for sequences of symbolsHerranz Sotoca, Javier; Nin Guerrero, Jordi; Solé Simó, Marc
9-oct-2010On server trust in private proxy auctionsDi Crescenzo, Giovanni; Herranz Sotoca, Javier; Sáez Moreno, Germán
oct-2010On secret sharing schemes, matroids and polymatroidsMartí Farré, Jaume; Padró Laimon, Carles
square-free-frobenius.pdf.jpgset-2010Square-free discriminants of Frobenius ringsDavid, Chantal; Jiménez Urroz, Jorge
Article_COSE_Herranz_Nin_postprint.pdf.jpg9-jun-2010Classifying data from protected statistical datasetsHerranz Sotoca, Javier; Matwin, Stan; Nin Guerrero, Jordi; Torra i Reventós, Vicenç
obsss.pdf.jpg2010On the optimization of bipartite secret sharing schemesFarras Ventura, Oriol; Metcalf-Burton, Jessica Ruth; Padró Laimon, Carles; Vázquez González, Leonor
2010Distributed privacy-preserving methods for statistical disclosure controlHerranz Sotoca, Javier; Nin Guerrero, Jordi; Torra i Reventós, Vicenç
2010Orders of CM elliptic curves modulo p with at most two primesIwaniec, H.; Jiménez Urroz, Jorge
2009Public verifiability from pairings in secret sharing schemesHeidarvand, Somayed; Villar Santos, Jorge Luis
jucs_15_14_2881_2893_herranz.pdf.jpg2009Ideal homogeneous access structures constructed from graphsHerranz Sotoca, Javier
22-jul-2008On the disclosure risk of multivariate microaggregationNin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç
1-abr-2008How to group attributes in multivariate microaggregationNin Guerrero, Jordi; Herranz Sotoca, Javier; Torra i Reventós, Vicenç
04479446.pdf.jpgago-2005On the computational security of a distributed key distribution schemeDaza, Vanesa; Herranz Sotoca, Javier; Sáez Moreno, Germán
ArsC-1985 (graphs-tesel).pdf.jpg1985The Diameter of undirected graphs associated to plane tessellationsAndrés Yebra, José Luis; Fiol Mora, Miquel Àngel; Morillo Bosch, M. Paz; Alegre de Miguel, Ignacio

 

Valid XHTML 1.0! Programari DSpace Copyright © 2002-2004 MIT and Hewlett-Packard Comentaris
Universitat Politècnica de Catalunya. Servei de Biblioteques, Publicacions i Arxius