Skip to main menu
Scroll to content
PL
|
EN
Full-text resources of PSJD and other databases are now available in the new Library of Science.
Visit
https://bibliotekanauki.pl
Search
Browse
About
test
Preferences
Polski
English
Language
enabled
[disable]
Abstract
10
20
50
100
Number of results
Link to site
Copy
Publisher
Polska Akademia Nauk
Journal
International Journal of Electronics and Telecommunications
Year
2018
Volume
64
Issue
2
Identifiers
Cover
Volume contents
2
article:
Benchmark Tests on Heuristic Methods in the Darts Game
(
Książek K.
,
Połap D.
,
Woźniak M.
)
article:
PixSel: Images as Book Cipher Keys. An Efficient Implementation Using Partial Homophonic Substitution Ciphers
(
Mykel S.
,
Gautam S.
)
article:
Scalable Method of Searching for Full-period Nonlinear Feedback Shift Registers with GPGPU. New List of Maximum Period NLFSRs.
(
Augustynowicz P.
,
Kanciak K.
)
article:
Efficiency Evaluation Method for the Devices with Infrasound Impact on Functioning of Computer Equipment
(
Wójcik W.
,
Korchenko A.
,
Tereykovsky I.
,
Aytkhozhaevа E.
,
Nurgul S.
,
Kosyuk Y.
,
Komada P.
,
Sikora J.
)
article:
Confidential Greedy Graph Algorithm
(
Waszkiewicz D.
,
Horubała A.
,
Sapiecha P.
,
Andrzejczak M.
)
article:
Phase-shift Fault Analysis of Grain v1
(
Hromada V.
,
Tibor P.
)
article:
Finding Differential Paths in ARX Ciphers through Nested Monte-Carlo Search
(
Dhar D. A.
,
Morawiecki P.
,
Wójtowicz S.
)
article:
Improving security of lightweith SHA-3 against preimage attacks
(
Onopa S.
,
Kotulski Z.
)
article:
Block Cipher Based Public Key Encryption via Indistinguishability Obfuscation
(
Horubała A.
,
Waszkiewicz D.
,
Andrzejczak M.
,
Sapiecha P.
)
article:
A first Catalgorithm?
(
Geneste J.-F.
)
article:
Pure Infinitely Self-Modifying Code is Realizable and Turing-complete
(
Morse G.
)
article:
Context Data Acquisition Using Adaptive Non-repudiation Model
(
Tunia M. A.
)
article:
Application of Neural Network for Testing Selected Specification Parameters of Voltage-Controlled Oscillator
(
Grzechca D.
,
Temich S.
)
article:
Tabu Search Against Permutation Based Stream Ciphers
(
Polak I.
,
Boryczka M.
)
article:
Proposal of a Secure Modbus RTU Communication with Adi Shamir's Secret Sharing Method
(
Ádámkó É.
,
Jakabóczki G.
,
Tamás S. P.
)
article:
A Novel Software-Defined Networking Controller: the Distributed Active Information Model (DAIM)
(
Pakawat P.
,
Ameen B.
,
Imam H. M.
,
Braun R.
,
Moulton B.
)
article:
Detailed Consideration of Graphical Calculation of Min-Plus Convolution in Deterministic Network Calculus
(
Borys A.
)
article:
Inertial Navigation Static Calibration
(
Niespodziany S.
)
article:
When Can a Narrowband Power Amplifier BeConsidered to Be Memoryless and when Not?
(
Borys A.
)
article:
Remote System for Reading Traffic Signs and Information
(
Janisz K.
,
Stępień J.
,
Odrobina S.
)
article:
Modelling of Parameterized Discrete Control Algorithms With Use of Finite State Machinesin TIA Portal Environment
(
Andrzejewski G.
,
Zając W.
)
open years
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.