Efficiency of Strategic Data Sharing and Management Protocols
暂无分享,去创建一个
[1] Doreen Meier,et al. An Introduction To Management Science Quantitative Approaches To Decision Making , 2016 .
[2] Marek R. Ogiela,et al. Cognitive systems for intelligent business information management in cognitive economy , 2014, Int. J. Inf. Manag..
[3] Marek R. Ogiela,et al. Security of Linguistic Threshold Schemes in Multimedia Systems , 2009, KES IIMSS.
[4] Lidia Ogiela,et al. Semantic analysis and biological modelling in selected classes of cognitive information systems , 2013, Math. Comput. Model..
[5] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[6] M.R. Ogiela,et al. Linguistic Extension for Secret Sharing (m, n)-Threshold Schemes , 2008, 2008 International Conference on Security Technology.
[7] Marek R. Ogiela,et al. Shadow Generation Protocol in Linguistic Threshold Schemes , 2009, FGIT-SecTech.
[8] Lidia Ogiela,et al. Data management in cognitive financial systems , 2013, Int. J. Inf. Manag..
[9] Adi Shamir,et al. How to share a secret , 1979, CACM.
[10] Marek R. Ogiela,et al. Cognitive systems and bio-inspired computing in homeland security , 2014, J. Netw. Comput. Appl..
[11] Marek R. Ogiela,et al. Semantic Analysis Processes in Advanced Pattern Understanding Systems , 2011 .
[12] Dennis J. Sweeney,et al. Study guide to accompany an introduction to management science : quantitative approaches to decision making , 1985 .
[13] Makoto Takizawa,et al. Personalized cryptography in cognitive management , 2017, Soft Comput..
[14] Marek R. Ogiela,et al. Framework for cognitive analysis of dynamic perfusion computed tomography with visualization of large volumetric data , 2012, J. Electronic Imaging.
[15] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .