![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Heili Joseph Heraud Jean-Mathias
Publisher: Inderscience Publishers
ISSN: 1461-4111
Source: International Journal of Information Technology and Management, Vol.8, Iss.1, 2008-12, pp. : 19-32
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Secret keys from quantum correlations
Informatik - Forschung und Entwicklung, Vol. 21, Iss. 1-2, 2006-10 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Binary search trees constructed from nondistinct keys with/without specified probabilities
By Kemp R.
Theoretical Computer Science, Vol. 156, Iss. 1, 1996-03 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
FAMOS — entering into the spirit of collaboration
By Robson Phil
Assembly Automation, Vol. 7, Iss. 2, 1993-12 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Social media: Entering the conversation
By Wilson Alan
Journal of Digital & Social Media Marketing, Vol. 3, Iss. 2, 2015-09 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
By Buneman P. Davidson S. Fan W. Hara C. Tan W.-C.
Information Systems, Vol. 28, Iss. 8, 2003-12 ,pp. :