Article
Journal: IEEE Transactions on Information Theory, 2024, Volume 70, Number 3, Page 2254
This item cites DOI: 10.1007/978-3-030-16458-4_18
Read OnlineArticle
Journal: Security and Communication Networks, 2020, Volume 2020, Page 1
DOI: 10.1155/2020/3512737
This item cites DOI: 10.1007/978-3-030-16458-4
Read OnlineArticle
Journal: The Journal of Supercomputing, 2022, Volume 78, Number 2, Page 2219
DOI: 10.1007/s11227-021-03927-w
This item cites DOI: 10.1007/978-3-030-16458-4_1
Read OnlineArticle
Journal: The Computer Journal, 2020, Volume 63, Number 4, Page 633
This item cites DOI: 10.1007/978-3-030-16458-4_11
Read OnlineChapter
Series: Lecture Notes in Computer Science, Year: 2020, Volume 12034, Page 53
DOI: 10.1007/978-3-030-42058-1_5
This item cites DOI: 10.1007/978-3-030-16458-4_23
Read OnlineArticle
Journal: IET Information Security, 2021, Volume 15, Number 4, Page 317
DOI: 10.1049/ise2.12022
This item cites DOI: 10.1007/978-3-030-16458-4_6
Read OnlineChapter
Series: Communications in Computer and Information Science, Year: 2019, Volume 1133, Page 149
DOI: 10.1007/978-3-030-36237-9_9
This item cites DOI: 10.1007/978-3-030-16458-4_26
Read OnlineConference Paper
Conference: 2019 XVI International Symposium "Problems of Redundancy in Information and Control Systems" (REDUNDANCY), Year: 2019, Page 93
DOI: 10.1109/REDUNDANCY48165.2019.9003335
This item cites DOI: 10.1007/978-3-030-16458-4_21
Read OnlineChapter
Series: Lecture Notes in Computer Science, Year: 2020, Volume 12578, Page 666
DOI: 10.1007/978-3-030-65277-7_30
This item cites DOI: 10.1007/978-3-030-16458-4_10
Read OnlineArticle
Journal: RAIRO - Theoretical Informatics and Applications, 2021, Volume 55, Page 10
DOI: 10.1051/ita/2021010
This item cites DOI: 10.1007/978-3-030-16458-4_16
Read Online