Cryptography, automata and learning theory
| Main Authors: | Jeyanthi, P. Abisha (Author), Thomas, D. Gnanaraj (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
New Delhi
Narosa Publishing House
c2011
|
| Subjects: |
Similar Items
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007)
by: Biham, Eli, et al.
Published: (2007)
Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 proceedings
by: Galbraith, Steven D.
Published: (2007)
by: Galbraith, Steven D.
Published: (2007)
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007)
by: Adams, Carlisle, et al.
Published: (2007)
Applications of supervised and unsupervised ensemble methods
by: Okun, Oleg, et al.
Published: (2009)
by: Okun, Oleg, et al.
Published: (2009)
Cryptography made simple
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
by: Smart, Nigel P. [ (Nigel Paul)] , 1967-
Published: (2016)
New directions of modern cryptography
by: Cao, Zhenfu
Published: (2013)
by: Cao, Zhenfu
Published: (2013)
Proceeding of the 21st National Symposium on Mathematical Sciences(SKSM21): Germination of Mathematical Sciences Education and Research towards Global Sustainability/
by: Mohd Tahir Ismail, et al.
Published: (2013)
by: Mohd Tahir Ismail, et al.
Published: (2013)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
Automata theory in theoretical computer science [
by: Jensen, Tomas
Published: (2012)
by: Jensen, Tomas
Published: (2012)
Computability theory & automata theory
by: Plante, Kristy, et al.
Published: (2012)
by: Plante, Kristy, et al.
Published: (2012)
Finite automata
by: Lawson, Mark V.
Published: (2004)
by: Lawson, Mark V.
Published: (2004)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Automata and computability
by: Kozen, Dexter 1951-
Published: (1997)
by: Kozen, Dexter 1951-
Published: (1997)
Cryptology and network security 6th International Conference, CANS 2007, Singapore, December 8-10, 2007 proceedings
by: Bao, Feng Dr
Published: (2007)
by: Bao, Feng Dr
Published: (2007)
Laser metrology and machine performance VI
by: Ford, D. G.
Published: (2003)
by: Ford, D. G.
Published: (2003)
Emerging trends in manufacturing
Published: (1986)
Published: (1986)
Introduction to automata theory, languages and computation
by: Hopcroft, John E. 1939-, et al.
Published: (2007)
by: Hopcroft, John E. 1939-, et al.
Published: (2007)
Introduction to automata theory, languages and computation
by: Hopcroft, John E. 1939-, et al.
Published: (2001)
by: Hopcroft, John E. 1939-, et al.
Published: (2001)
Introduction to automata theory, languages and computation
by: Hopcroft, John E. 1939-, et al.
Published: (2006)
by: Hopcroft, John E. 1939-, et al.
Published: (2006)
Financial cryptography and data security : 11th international conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007 : revised selected papers
by: Dhamija, Rachna, et al.
Published: (2007)
by: Dhamija, Rachna, et al.
Published: (2007)
Automata, computability and complexity theory and applications
by: Rich, Elaine
Published: (2008)
by: Rich, Elaine
Published: (2008)
Data mining and machine learning in cybersecurity
by: Dua, Sumeet, et al.
Published: (2011)
by: Dua, Sumeet, et al.
Published: (2011)
An introduction to formal languages and automata
by: Linz, Peter
Published: (2012)
by: Linz, Peter
Published: (2012)
Formal language and automata theory
by: Reddy, E. Srinivasa
Published: (2016)
by: Reddy, E. Srinivasa
Published: (2016)
Cryptography engineering : design principles and practical applications
by: Ferguson, Niels, et al.
Published: (2010)
by: Ferguson, Niels, et al.
Published: (2010)
Machine learning for dummies
by: Mueller, John 1958-, et al.
Published: (2016)
by: Mueller, John 1958-, et al.
Published: (2016)
Important concepts of machine learning
by: Clausen, Hassie
Published: (2014)
by: Clausen, Hassie
Published: (2014)
Downloading bibliographic records proceedings of a one-day seminar sponsored by the MARC Users' Group
by: Foulkes, John
Published: (1986)
by: Foulkes, John
Published: (1986)
Theory of computation for B.E (IT, CS), MCA, BSC, BCA, MSC and other computer courses
by: Sinha, Poonam, et al.
Published: (2016)
by: Sinha, Poonam, et al.
Published: (2016)
Utility-based learning from data
by: Friedman, Craig, et al.
Published: (2011)
by: Friedman, Craig, et al.
Published: (2011)
A first course in machine learning
by: Rogers, Simon 1979-, et al.
Published: (2012)
by: Rogers, Simon 1979-, et al.
Published: (2012)
Concepts, elements and applications of machine learning
by: Cooney, Margert, et al.
Published: (2014)
by: Cooney, Margert, et al.
Published: (2014)
Temporal data mining via unsupervised ensemble learning
by: Yang, Yun
Published: (2017)
by: Yang, Yun
Published: (2017)
Neural networks and computing : learning algorithms and applications
by: Chow, Tommy W. S., et al.
Published: (2007)
by: Chow, Tommy W. S., et al.
Published: (2007)
Cryptography and network security principles and practice
by: Stalling, William
Published: (2006)
by: Stalling, William
Published: (2006)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2006)
by: Stallings, William
Published: (2006)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
Algorithms, languages, automata, and compilers a practical approach
by: Mozgovoy, Maxim
Published: (2010)
by: Mozgovoy, Maxim
Published: (2010)
Similar Items
-
Selected areas in cryptography 13th international workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 revised selected papers
by: Biham, Eli, et al.
Published: (2007) -
Cryptography and coding 11th IMA International Conference, Cirencester, UK, December 18-20, 2007 proceedings
by: Galbraith, Steven D.
Published: (2007) -
Cryptography Infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013) -
Selected areas in cryptography 14th international workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007 : revised selected papers
by: Adams, Carlisle, et al.
Published: (2007) -
Applications of supervised and unsupervised ensemble methods
by: Okun, Oleg, et al.
Published: (2009)