Xxxxx and X Sample Clauses

Xxxxx and X. Xxxxxxxxxx. Non-Commutative Geometry, Non- Associative Geometry and the Standard Model of Particle Physics, 1401.5083.
AutoNDA by SimpleDocs
Xxxxx and X. Xxxxxxxxxx. A new algebraic structure in the standard model of particle physics. JHEP 06 (2018) 071. [9] X. xxx xxx Xxxxx and X. X. xxx Xxxxxxxxx. Supersymmetric QCD and noncommutative geometry. Commun. Math. Phys. 303 (2011) 149–173. [10] X. xxx xxx Xxxxx and X. X. xxx Xxxxxxxxx. Supersymmetric QCD from noncommutative geometry. Phys. Lett. B699 (2011) 119–122. [11] X. Xxxxxxx, X. Xxxx, and X. Xxxxxxx. The Standard Model as an ex- tension of the noncommutative algebra of forms. arXiv:1504.03890.
Xxxxx and X. Xxxxxxxx, X. Xx. Chem. Soc., 2016, 138, 14218–14221;
Xxxxx and X. Xxxxxxxxxx. A fuzzy commitment scheme. In Sixth ACM Conference on Computer and Communication Security, pages 28–36, 1999. [KOY01] X. Xxxx, X. Xxxxxxxxx, and X. Xxxx. Efficient password-authenticated key exchange using human-memorable passwords. In EUROCRYPT 2001. [LT03] J.-P. M. G. Linnartz and X. Xxxxx. New shielding functions to enhance privacy and prevent misuse of biometric templates. In AVBPA, 2003. [Mau92] Xxxx Xxxxxx. Conditionally-perfect secrecy and a provably-secure random- ized cipher. Journal of Cryptology, 5(1):53–66, 1992. [Mau93] Xxxx Xxxxxx. Secret key agreement by public discussion from common infor- mation. IEEE Transactions on Information Theory, 39(3):733–742, 1993. [Mau97] Xxxx Xxxxxx. Information-theoretically secure secret-key agreement by NOT authenticated public discussion. In EUROCRYPT 97, pp. 209–225. [MW97] X. Xxxxxx and X. Xxxx. Privacy amplification secure against active adver- saries. In Advances in Cryptology—CRYPTO ’97, pages 307–321. [MW03] X. Xxxxxx and X. Xxxx. Secret-key agreement over unauthenticated public channels — Part III: Privacy amplification. IEEE Transactions on Infor- mation Theory, 49(4):839–851, 2003. [RW03] X. Xxxxxx and X. Xxxx. Unconditional authenticity and privacy from an arbitrarily weak secret. In Advances in Cryptology—CRYPTO 2003. [RW05] X. Xxxxxx and X. Xxxx. Simple and tight bounds for information reconcili- ation and privacy amplification. In ASIACRYPT 2005, Springer. [SZ99] X. Xxxxxxxxxx and X. Xxxxxxxxx. Computing with very weak random sources. SIAM Journal on Computing, 28(4):1433–1459, 1999. [Vad04] X. Xxxxxx. Constructing locally computable extractors and cryptosystems in the bounded-storage model. Journal of Cryptology, 17(1), 2004. [WC81] M.N. Xxxxxx and X.X. Xxxxxx. New hash functions and their use in au- thentication and set equality. J. Computer and System Sciences, 22, 1981. [Wol98] X. Xxxx. Strong security against active attacks in information-theoretic secret-key agreement. In ASIACRYPT ’98, volume 1514 of LNCS.
Xxxxx and X. Xxxxxxxx. Identity Based Encryption from The Weil Pairing. Advances in Cryptology - Crypto 2001, LNCS 2139, 2001.
Xxxxx and X. Xxxxx. QOM - Quick Ontology Mapping. In Proceedings of the International
Xxxxx and X. X. Xxxxx. 2004a. Age and growth of least chub, Ioticthys phlegethontis, in wild populations. West. N. American Naturalist 64(3):409-412. Xxxxx, M. D. R. B. Xxxxx and X. X. Xxxx. 2004b. Complex interactions between native and invasive fish: the simultaneous effects of multiple negative interactions. Oecologia 141:713-721. Mock, K. E. and X. X. Xxxxxx. 2003. Molecular diversity within and among extant populations of least chub (Iotichthys phlegethontis). A report prepared for the Utah Division of Wildlife Resources, Native Aquatic Species Section. Xxxxxxxxx, X.X. 1985. 1985 status survey of least chub (Iotichthys phlegethontis) in desert springs of western Utah. Utah Division of Wildlife Resources. 107 pp. Xxxx, D.S. and X. Xxxx. 1987. Least chub investigations, Box Elder County, 1985-1986. Utah Division of Wildlife Resources, Salt Lake City, Utah. Xxxxxxx, M., X. X. Xxxxxxx, and X. Xxxxx. 1998. Conservation agreement and strategy for least chub (Iotichthys phlegethontis) in the State of Utah. Utah Division of Wildlife Resources, Salt Lake City, Utah. Pub. Number 98-25. Sapalsky, N. and X. Xxxxxxxxx, X. Xxxxxxx. 2001. Adaptive Management: A Tool for Conservation Practitioners. Report issued by the Biodiversity Support Program, Washington, DC.
AutoNDA by SimpleDocs
Xxxxx and X. Xxxxxxxx. An Incentive-Compatible Reputation Mechanism. In Proceedings of the IEEE Conference on E-Commerce, Newport Beach, CA, USA, 2003.
Xxxxx and X. Xxxxxxxxxx. An approach to service allocation in the Internet. Internet draft: draft-xxxxx- di -svc-alloc-00.txt, July 1997.
Xxxxx and X. X. Xxxxx. Towards optimal distributed consensus (extended abstract). In 30th Annual Symposium on Foundations of Computer Science, pages 410{415. IEEE, 1989.
Time is Money Join Law Insider Premium to draft better contracts faster.