•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
View Item 
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  •   FUM Digital Library
  • Fum
  • Articles
  • Latin Articles
  • View Item
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Opportunity cost based constraint model for transaction credit evaluation

Author:
Yuanlin Chen , Yi Liu , Yueting Chai , Hongbo Sun
Publisher:
IEEE
Year
: 2014
DOI: 10.1109/ICSICT.2014.7021612
URI: http://libsearch.um.ac.ir:80/fum/handle/fum/999010
Keyword(s): cryptography,digital simulation,Keccak hash function,Modelsim SE tool,SHA-3 algorithm,SHA-3 competition,antidistinguish attack,distinguish attacks,encryption process,improved CP-kernel,zero-sum permutation property,Abstracts,Algorithm design and analysis,Cryptography
Collections :
  • Latin Articles
  • Show Full MetaData Hide Full MetaData
  • Statistics

    Opportunity cost based constraint model for transaction credit evaluation

Show full item record

contributor authorYuanlin Chen , Yi Liu , Yueting Chai , Hongbo Sun
date accessioned2020-03-12T20:01:34Z
date available2020-03-12T20:01:34Z
date issued2014
identifier other6846847.pdf
identifier urihttp://libsearch.um.ac.ir:80/fum/handle/fum/999010?locale-attribute=en
formatgeneral
languageEnglish
publisherIEEE
titleOpportunity cost based constraint model for transaction credit evaluation
typeConference Paper
contenttypeMetadata Only
identifier padid8119284
subject keywordscryptography
subject keywordsdigital simulation
subject keywordsKeccak hash function
subject keywordsModelsim SE tool
subject keywordsSHA-3 algorithm
subject keywordsSHA-3 competition
subject keywordsantidistinguish attack
subject keywordsdistinguish attacks
subject keywordsencryption process
subject keywordsimproved CP-kernel
subject keywordszero-sum permutation property
subject keywordsAbstracts
subject keywordsAlgorithm design and analysis
subject keywordsCryptography
identifier doi10.1109/ICSICT.2014.7021612
journal titleomputer Supported Cooperative Work in Design (CSCWD), Proceedings of the 2014 IEEE 18th Internationa
filesize276618
citations0
  • About Us
نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
DSpace software copyright © 2019-2022  DuraSpace