-
221Published 2002Table of Contents: “… of Quantum Key Distribution -- Anonymous-Key Quantum Cryptography and Unconditionally Secure Quantum Bit…”
Full Text via HEAL-Link
Electronic eBook -
222Published 2006Table of Contents: “… Constraints -- k-Anonymous Decision Tree Induction -- Closed Sets for Labeled Data -- Finding Trees from…”
Full Text via HEAL-Link
Electronic eBook -
223Published 2007Table of Contents: “… Key Agreement with Anonymity for Ad Hoc Networks -- Buffer Cache Level Encryption for Embedded Secure…”
Full Text via HEAL-Link
Electronic eBook -
224Published 2019Table of Contents: “…. Shakespeare: "On your imaginary forces work" -- 10. Shakespeare: The best actors are but shadows -- 11. Thomas…”
Full Text via HEAL-Link
Electronic eBook -
225
-
226by Izquierdo, IvanTable of Contents: “… The rapid forgetting of working memory is intrinsic to its nature 2.5 Brain areas and systems involved…”
Published 2015
Full Text via HEAL-Link
Electronic eBook -
227Table of Contents: “… 55 -- 3.3.2 OBU Short-Time Anonymous Key Generation 56 -- 3.3.3 OBU Safety Message Sending 62…”
Full Text via HEAL-Link
eBook -
228
-
229
-
230Published 2018Table of Contents: “… -- Annotation -- Annotation-based Image Retrieval -- Anomaly Detection on Streams -- Anonymity -- ANSI/INCITS…”
Full Text via HEAL-Link
Electronic eBook -
231
-
232Published 2016Table of Contents: “… for Development of Accented Indian English ASR -- Chapter 17. Improved Identity Anonymization Using Hashed-TOR…”
Full Text via HEAL-Link
Electronic eBook -
233
-
234
-
235
-
236Published 2001Table of Contents: “… -- DSP Implementation of Fuzzy Controlled Magnetic Levitation System -- Programming Work Simulator…”
Full Text via HEAL-Link
Electronic eBook -
237Published 2020“…, and writers working at the crossroads of speculative philosophy and speculative horror. At once a compendium…”
-
238Published 2022“…Anthony Hewitson (1836-1912) was a typical Victorian journalist, working in one of the largest…”
Get full text
-
239
-
240