X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
distinguish (11) 11
humans (8) 8
index medicus (7) 7
clinical neurology (4) 4
diagnosis (4) 4
distinguish attack (4) 4
female (4) 4
adult (3) 3
behavioral sciences (3) 3
distinguishes (3) 3
male (3) 3
middle aged (3) 3
neurology (3) 3
psychiatry (3) 3
seizures - psychology (3) 3
adolescent (2) 2
analysis (2) 2
animals (2) 2
child (2) 2
children (2) 2
conversion disorder (2) 2
criminal law & procedure (2) 2
disease progression (2) 2
electroencephalography (2) 2
epilepsy (2) 2
history (2) 2
introduction (2) 2
laws, regulations and rules (2) 2
life sciences (2) 2
methods (2) 2
personality (2) 2
physiological aspects (2) 2
prosecution (2) 2
psychogenic nonepileptic seizures (2) 2
psychotherapy (2) 2
research (2) 2
seizures (2) 2
seizures - diagnosis (2) 2
seizures - therapy (2) 2
separation (2) 2
stream cipher (2) 2
stress (2) 2
treatment outcome (2) 2
"feminist" austen (1) 1
"postfeminist" - a contentious term (1) 1
2000) but not greedy governments. yet capturing tax revenue might motivate governments to control territory (1) 1
abc stream ciphers (1) 1
abortion (1) 1
abridged index medicus (1) 1
accomplice (1) 1
accuracy (1) 1
active facilitation: exerting pressure for concessions ‐ conflict resolution through variety of techniques during negotiation phase (1) 1
addition modulo 2 (1) 1
adult development (1) 1
adults (1) 1
aged (1) 1
aged, 80 and over (1) 1
airway resistance - physiology (1) 1
alexithymia (1) 1
algorithm (1) 1
algorithm analysis and problem complexity (1) 1
algorithm design and analysis (1) 1
amyloid precursor protein (1) 1
and weigh against a dominant role for other mechanisms linking investment and violence (1) 1
animal behavior (1) 1
animals, newborn (1) 1
antibodies (1) 1
antipredator behavior (1) 1
antony, mark (1) 1
anxiety - psychology (1) 1
application (1) 1
application software (1) 1
as well as increases in rebel attacks. the “tax capture” response reverses in the following year (1) 1
ascomycota - pathogenicity (1) 1
ascomycota - physiology (1) 1
asthma (1) 1
asthma - diagnosis (1) 1
asthma - physiopathology (1) 1
asthmatic-children (1) 1
attack (1) 1
attorneys general (1) 1
attractiveness (1) 1
axons (1) 1
axons - pathology (1) 1
b cells (1) 1
b lymphocytes (1) 1
b-1 cells (1) 1
b-2 cells (1) 1
b-lymphocyte subsets - immunology (1) 1
background on dispute resolution proceedings ‐ features that distinguish from trials (1) 1
basal ganglia (1) 1
basal ganglia - pathology (1) 1
basal ganglia - physiology (1) 1
behavior (1) 1
benjamin franklin and the native americans (1) 1
beta vulgaris - microbiology (1) 1
beta vulgaris - physiology (1) 1
bias (1) 1
biological markers (1) 1
biological sciences (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Tatra Mountains Mathematical Publications, ISSN 1210-3195, 2012, Volume 53, Issue 1, pp. 21 - 32
ABSTRACT The Australian stream cipher NLSv2 [Hawkes, P.-Paddon, M.-Rose, G. G.-De Vries, M. W.: Primitive specification for NLSv2, Project eSTREAM web page,... 
distinguish | nonlinear | attack | stream cipher | algorithm
Journal Article
電子情報通信学会技術研究報告. ICSS, 情報通信システムセキュリティ, ISSN 0913-5685, 02/2015, Volume 114, pp. 73 - 78
ある擬似乱数生成器(PRNG)がセキュリティ要件を満たしているかどうかを検証する方法の一つに,統計的乱数検定がある.様々な検定法が提案されているなかで,NIST Special Publication 800-22(NIST SP800-22)は頻繁に利用されている検定法である.本研究では,NIST... 
Journal Article
The 9th International Conference on Advanced Communication Technology, ISSN 1738-9445, 02/2007, Volume 3, pp. 1768 - 1770
...) each of 128-bit length. In this paper we propose a new distinguish attack to finding the internal state of component B and C of ABC algorithm in time 88 complexity of 2... 
Algorithm design and analysis | ABC stream ciphers | ECRYPT Project | Vectors | Security | Application software | Equations | Design optimization | distinguish attack | ECRYPT project | Distinguish attack
Conference Proceeding
Proceedings - Wec 05: Fourth World Enformatika Conference, 2005, Volume 6, pp. 282 - 285
Conference Proceeding
Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, ISSN 1001-2486, 04/2012, Volume 34, Issue 2, pp. 42 - 45
Journal Article
Conference Proceeding
Journal Article
Yakugaku zasshi, ISSN 0031-6903, 2010, Volume 130, Issue 6, pp. 881 - 887
...). The positive rate of the migraine screener was 64%. In the positive group, patients had moderate-to-severe migraine attacks in the past... 
pharmacist | screener | migraine
Journal Article
2012 International Conference on Computer Science and Service System, 08/2012, pp. 960 - 963
.... Distributed denial of-service (DDoS) attacks are similar to flash Events, but the only difference is users' intention... 
Classification | Network Security | Traffic control | Iron | Web servers | Flash Event | DDoS | Web sites | History | Computer crime | Distinguish
Conference Proceeding
2005, Lecture Notes in Computer Science, ISBN 3540309349, Volume 3783, 11
Book Chapter
The New England Journal of Medicine, ISSN 0028-4793, 01/1998, Volume 338, Issue 5, pp. 278 - 285
Journal Article