Showing 1 - 20 results of 1,031 for search '(((pin OR yang) OR pine) OR (((ping OR (shinae OR sheng)) OR (pinga OR tingga)) OR (min OR main)))', query time: 0.08s Refine Results
  1. 1
  2. 2

    On refactorization problems and rational Lax matrices of quadrirational Yang-Baxter maps by Kassotakis, Pavlos, Kouloukas, Theodoros E., Nieszporski, Maciej

    Published 2025
    “…We present rational Lax representations for one-component parametric quadrirational Yang–Baxter maps in both the abelian and non-abelian settings. …”
    Get full text
    Get full text
    Article
  3. 3

    A study of the legal effect of the main provisions of the income tax treaty between France and the United Kingdom by McKee, Sophie A. Hoquet

    Published 1984
    “…This thesis analyses the taxation rules applicable to different classes of income and the respective rights to tax of both the state of source and the state of residence. Its main objective is to provide an exhaustive explanation of the rules of taxation, together with an illustration of their practical operation. …”
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    Transformational jewellery: practice-based research on the relationship between transformation and emotional attachment by Kim, Min Sun

    Published 2015
    “…This specific transformation, which has been identified in both text and practical works, constitute the main contribution to knowledge in the field of contemporary jewellery.…”
    Get full text
    Thesis
  10. 10
  11. 11

    Secure channel free public key encryption with multiple keywords search by Ma, Yang

    Published 2020
    “…However, no matter what happened, Multiple Keywords Search and Keyword Guessing Attack are still two main research interests for the consideration. This PhD research aims to propose a few PEKS schemes in order to solve both Single and Multiple Keyword(s) Search issues and resist Off-line Keyword Guessing Attack (OKGA) and/or Inside Keyword Guessing Attack (IKGA). …”
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15

    Fuzzy logic application to searchable cryptography by Kazemian, Hassan, Ma, Yang

    Published 2020
    “…Besides, some PEKS schemes are not secure mainly because they are vulnerable to Off-line Keyword Guessing Attack (OKGA). …”
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20