UCL logo

UCL Discovery

UCL home » Library Services » Electronic resources » UCL Discovery

Browse by UCL Departments and Centres

Up a level
Export as [feed] RSS 2.0 [feed] RSS 1.0 [feed] Atom
Group by: Author | Type
Number of items: 15.

Article

COX, IJ; (1984) EXPERT SYSTEMS. ELECTRON POWER , 30 (3) 237 - 240.

COX, IJ; (1984) INCREASING THE BIT PACKING DENSITIES OF OPTICAL DISK SYSTEMS. APPL OPTICS , 23 (19) 3260 - 3261.

COX, IJ; (1984) SCANNING OPTICAL FLUORESCENCE MICROSCOPY. J MICROSC-OXFORD , 133 (FEB) 149 - 154.

Cox, IJ; (1984) Scanning optical fluorescence microscopy. Journal of Microscopy , 133 (2) 149 - 154.

Cox, IJ; (1984) Scanning optical fluorescence microscopy. J Microsc , 133 (Pt 2) 149 - 154.

COX, IJ; SHEPPARD, CJR; (1984) IMAGING IN A SCANNING PHOTOACOUSTIC MICROSCOPE. J ACOUST SOC AM , 76 (2) 513 - 515.

SHEPPARD, CJR; COX, IJ; HAMILTON, DK; (1984) EDGE-DETECTION IN MICROMETROLOGY WITH NEARLY CONFOCAL MICROSCOPY. APPL OPTICS , 23 (5) 657 - 658.

Slater, M; (1984) GKS in Pascal. Comput. Graph. Forum , 3 , Article 4. 10.1111/j.1467-8659.1984.tb00159.x.

Slater, M; Baker, RJ; (1984) GRAPH--An interactive program based on the Graphical Kernel System. Computers & Graphics , 8 , Article 2. 10.1016/0097-8493(84)90047-5.

Book chapter

Biggs, N; Shawe-Taylor, J; (1984) Rotations and Graphs with Large Girth. In: UNSPECIFIED Pitman Advanced Publ. Program

Proceedings paper

Davio, M; Desmedt, Y; Goubert, J; Hoornaert, F; Quisquater, J-J; (1984) Efficient Hardware and Software Implementations for the DES. In: Blakley, GR and Chaum, D, (eds.) CRYPTO. (pp. 144 - 146). Springer

Desmedt, Y; Quisquater, J-J; Davio, M; (1984) Dependence of Output on Input in DES: Small Avalanche Characteristics. In: Blakley, GR and Chaum, D, (eds.) CRYPTO. (pp. 359 - 376). Springer

Desmedt, Y; Vandewalle, J; Govaerts, R; (1984) A critical analysis of the security of knapsack public-key algorithms. In: IEEE Transactions on Information Theory. (pp. 601 - 610).

Govaerts, R; Desmedt, Y; Vandewalle, J; (1984) Cryptography: How to Attack, What to Protect? In: ICC (1). (pp. 175 - 178).

Hoornaert, F; Goubert, J; Desmedt, Y; (1984) Efficient Hardware Implementation of the DES. In: Blakley, GR and Chaum, D, (eds.) CRYPTO. (pp. 147 - 173). Springer

This list was generated on Sun Nov 23 09:23:36 2014 GMT.