Search dblp for Publications

export results for "toc:db/journals/ijcmcst/ijcmcst6.bht:"

 download as .bib file

@article{DBLP:journals/ijcmcst/AchkounHSZO21,
  author       = {Khadija Achkoun and
                  Charifa Hanin and
                  Anas Sadak and
                  Fatima Ezzahra Ziani and
                  Fouzia Omary},
  title        = {{SPF-CA-1.2:} an enhanced version of cellular automata-based block
                  cipher system},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {3},
  pages        = {194--208},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1942991},
  doi          = {10.1080/23799927.2021.1942991},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/AchkounHSZO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/AnshelAGG21,
  author       = {Iris Anshel and
                  Derek Atkins and
                  Dorian Goldfeld and
                  Paul E. Gunnells},
  title        = {WalnutDSA{\texttrademark}: a group theoretic digital signature algorithm},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {260--284},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1831613},
  doi          = {10.1080/23799927.2020.1831613},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/AnshelAGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/AzarderakhshBKL21,
  author       = {Reza Azarderakhsh and
                  Jean{-}Fran{\c{c}}ois Biasse and
                  Rami El Khatib and
                  Brandon Langenberg and
                  Benjamin Pring},
  title        = {Parallelism strategies for the tuneable golden-claw finding problem},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {337--363},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1884605},
  doi          = {10.1080/23799927.2021.1884605},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/AzarderakhshBKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/BessonovGS21,
  author       = {Mariya Bessonov and
                  Dima Grigoriev and
                  Vladimir Shpilrain},
  title        = {Probability theory and public-key cryptography},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {285--290},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1853238},
  doi          = {10.1080/23799927.2020.1853238},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/BessonovGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/BhutaniKM21,
  author       = {Kiran R. Bhutani and
                  Ravi Kalpathy and
                  Hosam M. Mahmoud},
  title        = {Average measures in polymer graphs},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {1},
  pages        = {37--53},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1860134},
  doi          = {10.1080/23799927.2020.1860134},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/BhutaniKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/CaiS21,
  author       = {Hongyan Cai and
                  Qiang Sun},
  title        = {A note on improper DP-colouring of planar graphs},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {2},
  pages        = {159--166},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1872707},
  doi          = {10.1080/23799927.2021.1872707},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/CaiS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/CaoLY21,
  author       = {Chunhua Cao and
                  Haiyan Liu and
                  Di Yang},
  title        = {Some properties of d-codes},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {2},
  pages        = {167--177},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1905715},
  doi          = {10.1080/23799927.2021.1905715},
  timestamp    = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/CaoLY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/ChakrabortyRR21,
  author       = {Suvradip Chakraborty and
                  Y. Sreenivasa Rao and
                  C. Pandu Rangan},
  title        = {Efficient single round attribute-based authenticated key exchange
                  protocol},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {313--336},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1873192},
  doi          = {10.1080/23799927.2021.1873192},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/ChakrabortyRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/DannerK21,
  author       = {Julian Danner and
                  Martin Kreuzer},
  title        = {A fault attack on KCipher-2},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {291--312},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1854863},
  doi          = {10.1080/23799927.2020.1854863},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/DannerK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/DobsonGLTZ21,
  author       = {Samuel Dobson and
                  Steven D. Galbraith and
                  Jason T. LeGrow and
                  Yan Bo Ti and
                  Lukas Zobernig},
  title        = {An adaptive attack on 2-SIDH},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {387--404},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.2018115},
  doi          = {10.1080/23799927.2021.2018115},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/DobsonGLTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/DruckerGKP21,
  author       = {Nir Drucker and
                  Shay Gueron and
                  Dusan Kostic and
                  Edoardo Persichetti},
  title        = {On the applicability of the Fujisaki-Okamoto transformation to the
                  {BIKE} {KEM}},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {364--374},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1930176},
  doi          = {10.1080/23799927.2021.1930176},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/DruckerGKP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/FineKR21,
  author       = {Benjamin Fine and
                  Martin Kreuzer and
                  Gerhard Rosenberger},
  title        = {Further potential applications of group theory in information security},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {375--380},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1931455},
  doi          = {10.1080/23799927.2021.1931455},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/FineKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/Grassl21,
  author       = {Markus Grassl},
  title        = {Algebraic quantum codes: linking quantum mechanics and discrete mathematics},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {243--259},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1850530},
  doi          = {10.1080/23799927.2020.1850530},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/Grassl21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/GrigorievS21,
  author       = {Dima Grigoriev and
                  Vladimir Shpilrain},
  title        = {{RSA} and redactable blockchains},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {1},
  pages        = {1--6},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1842808},
  doi          = {10.1080/23799927.2020.1842808},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/GrigorievS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/IsaacK21,
  author       = {Steve Isaac and
                  Delaram Kahrobaei},
  title        = {A closer look at the tropical cryptography},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {2},
  pages        = {137--142},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1862303},
  doi          = {10.1080/23799927.2020.1862303},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/IsaacK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/KahrobaeiS21,
  author       = {Delaram Kahrobaei and
                  Vladimir Shpilrain},
  title        = {A note on fully homomorphic encryption of real-life data},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {381--385},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1988714},
  doi          = {10.1080/23799927.2021.1988714},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/KahrobaeiS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/Kim21,
  author       = {Kijung Kim},
  title        = {Restrained Italian domination in trees},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {3},
  pages        = {236--242},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1973567},
  doi          = {10.1080/23799927.2021.1973567},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/Kim21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/MalikB21,
  author       = {Osman Asif Malik and
                  Stephen Becker},
  title        = {Randomization of approximate bilinear computation for matrix multiplication},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {1},
  pages        = {54--93},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1861104},
  doi          = {10.1080/23799927.2020.1861104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/MalikB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/MaryPRM21,
  author       = {R. Stalin Mary and
                  N. Parthiban and
                  Indra Rajasingh and
                  Paul D. Manuel},
  title        = {Optimal layout of recursive circulant graphs},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {3},
  pages        = {209--219},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1963999},
  doi          = {10.1080/23799927.2021.1963999},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/MaryPRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/MesrikhaniFI21,
  author       = {Amir Mesrikhani and
                  Mohammad Farshi and
                  Behnam Iranfar},
  title        = {A progressive algorithm for the closest pair problem},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {2},
  pages        = {130--136},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1862302},
  doi          = {10.1080/23799927.2020.1862302},
  timestamp    = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/MesrikhaniFI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/MinkeviciusS21,
  author       = {Saulius Minkevicius and
                  Leonidas Sakalauskas},
  title        = {On the law of iterated logarithm for extreme queue length in an open
                  queueing network},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {3},
  pages        = {220--235},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1969432},
  doi          = {10.1080/23799927.2021.1969432},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/MinkeviciusS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/MosesAOMA21,
  author       = {Abiodun Kazeem Moses and
                  Joseph Bamidele Awotunde and
                  Roseline Oluwaseun Ogundokun and
                  Sanjay Misra and
                  Emmanuel Abidemi Adeniyi},
  title        = {Applicability of {MMRR} load balancing algorithm in cloud computing},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {1},
  pages        = {7--20},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1854864},
  doi          = {10.1080/23799927.2020.1854864},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/MosesAOMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/Rahmani21,
  author       = {Arsalan Rahmani},
  title        = {A new closed-open vehicle routing approach in stochastic environments},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {2},
  pages        = {113--129},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1861660},
  doi          = {10.1080/23799927.2020.1861660},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/Rahmani21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/RajaRX21,
  author       = {S. Maria Jesu Raja and
                  Indra Rajasingh and
                  Antony Xavier},
  title        = {Induced H-packing k-partition of graphs},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {2},
  pages        = {143--158},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1871418},
  doi          = {10.1080/23799927.2020.1871418},
  timestamp    = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/RajaRX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/Rudi21,
  author       = {Ali Gholami Rudi},
  title        = {Approximate curve-restricted simplification of polygonal curves},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {2},
  pages        = {178--187},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1905717},
  doi          = {10.1080/23799927.2021.1905717},
  timestamp    = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/Rudi21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/SafaeiJF21,
  author       = {Farshad Safaei and
                  F. Kashkooei Jahromi and
                  S. Fathi},
  title        = {Graphlets importance ranking in complex networks based on the spectral
                  energy contribution},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {1},
  pages        = {21--36},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1859618},
  doi          = {10.1080/23799927.2020.1859618},
  timestamp    = {Fri, 05 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/SafaeiJF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/StoyanY21,
  author       = {Yuriy Stoyan and
                  Georgiy Yaskov},
  title        = {Optimized packing unequal spheres into a multiconnected domain: mixed-integer
                  non-linear programming approach},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {1},
  pages        = {94--111},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2020.1861105},
  doi          = {10.1080/23799927.2020.1861105},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/StoyanY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/WangZHT21,
  author       = {Ke Wang and
                  Jiannan Zhou and
                  Dong He and
                  Qinghe Tong},
  title        = {Note on the three-coloured bipartite Ramsey numbers for paths},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {3},
  pages        = {189--193},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.1934900},
  doi          = {10.1080/23799927.2021.1934900},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/WangZHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/X21,
  title        = {Correction},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {386},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.2018117},
  doi          = {10.1080/23799927.2021.2018117},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/X21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics