•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Differential evolution with dither and annealed scale factor

Author:
Dawar, D.
,
Ludwig, S.A.
Publisher:
IEEE
Year
: 2014
DOI: 10.1109/ICCCN.2014.6911807
URI: http://libsearch.um.ac.ir:80/fum/handle/fum/1100273
Keyword(s): cryptography,n government data processing,n counter attack requirements,n cryptographic techniques,n election integrity,n primary cryptographic techniques,n real world constraints,n remote voting schemes,n security models,n security requirements,n Electronic voting,n Encryption,n Nominations and elections,n Protocols,n Public key,n Cryptography,n Electronic voting scheme,n Privacy,n Protocol,n Remote voting
Collections :
  • Latin Articles
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Differential evolution with dither and annealed scale factor

Show full item record

contributor authorDawar, D.
contributor authorLudwig, S.A.
date accessioned2020-03-12T22:57:11Z
date available2020-03-12T22:57:11Z
date issued2014
identifier other7031528.pdf
identifier urihttp://libsearch.um.ac.ir:80/fum/handle/fum/1100273?locale-attribute=en
formatgeneral
languageEnglish
publisherIEEE
titleDifferential evolution with dither and annealed scale factor
typeConference Paper
contenttypeMetadata Only
identifier padid8242276
subject keywordscryptography
subject keywordsn government data processing
subject keywordsn counter attack requirements
subject keywordsn cryptographic techniques
subject keywordsn election integrity
subject keywordsn primary cryptographic techniques
subject keywordsn real world constraints
subject keywordsn remote voting schemes
subject keywordsn security models
subject keywordsn security requirements
subject keywordsn Electronic voting
subject keywordsn Encryption
subject keywordsn Nominations and elections
subject keywordsn Protocols
subject keywordsn Public key
subject keywordsn Cryptography
subject keywordsn Electronic voting scheme
subject keywordsn Privacy
subject keywordsn Protocol
subject keywordsn Remote voting
identifier doi10.1109/ICCCN.2014.6911807
journal titleifferential Evolution (SDE), 2014 IEEE Symposium on
filesize717154
citations0
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace