Author:
Ogiela Urszula,Takizawa Makoto,Ogiela Lidia
Publisher
Springer International Publishing
Reference10 articles.
1. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)
2. Ogiela, L.: Computational intelligence in cognitive healthcare information systems. Bichindaritz, I., Vaidya, S., Jain, A., Jain, L.C. (eds.) Computational Intelligence in Healthcare 4. Studies in Computational Intelligence, vol. 309, pp. 347–369. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14464-6_16
3. Ogiela, M.R., Ogiela, L., Ogiela, U.: Biometric methods for advanced strategic data sharing protocols. In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing IMIS 2015, pp. 179–183 (2015). https://doi.org/10.1109/IMIS.2015.29
4. Nakamura, S., Ogiela, L., Enokido, T., Takizawa, M.: Flexible synchronization protocol to prevent illegal information flow in peer-to-peer publish/subscribe systems. In: Barolli, L., Terzo, O. (eds.) Complex, Intelligent, and Software Intensive Systems. Advances in Intelligent Systems and Computing, vol. 611, pp. 82–93. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-61566-0_8
5. Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, Hoboken (2013)