Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Analysis of security criteria for block ciphers
Download
082488.pdf
Date
1999
Author
Aras, Ekrem
Metadata
Show full item record
Item Usage Stats
65
views
0
downloads
Cite This
URI
https://hdl.handle.net/11511/2381
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
Analysis of Multiobjective Algorithms for the Classification of Multi-Label Video Datasets
Karagoz, Gizem Nur; Yazıcı, Adnan; Dokeroglu, Tansel; Cosar, Ahmet (Institute of Electrical and Electronics Engineers (IEEE), 2020)
It is of great importance to extract and validate an optimal subset of non-dominated features for effective multi-label classification. However, deciding on the best subset of features is an NP-Hard problem and plays a key role in improving the prediction accuracy and the processing time of video datasets. In this study, we propose autoencoders for dimensionality reduction of video data sets and ensemble the features extracted by the multi-objective evolutionary Non-dominated Sorting Genetic Algorithm and t...
Analysis of certain serial search strategies for FM frequency hopping system
Tekinel, Nazan; Tanık, Yalçın; Department of Electrical and Electronics Engineering (1988)
Analysis of security requirements for cryptographic voting protocols (extended abstract)
Cetinkaya, Orhan (2008-03-07)
Electronic voting refers to the use of computers or computerized voting equipment to cast ballots in an election and it is not an easy task due to the need of achieving electronic voting security requirements. The cryptographic voting protocols use advanced cryptography to make electronic voting secure and applicable.
Analysis of threshold dynamics of epidemic models in a periodic environment
Evcin, Cansu; Uğur, Ömür; Department of Scientific Computing (2013)
Threshold dynamics used to control the spread of the disease in infectious disease phenomena has an overwhelming importance and interest in mathematical epidemiology. One of the famous threshold quantity is known to be the basic reproduction ratio. Its formulation as well as computation is the main concern of infectious diseases. The aim of this thesis is to analyze the basic reproduction ratio in both autonomous and periodic systems via defining R0 as the spectral radius of the next generation operator. Th...
Analysis of methods for border ownership estimation
Olgunsoylu, Sertaç; Kalkan, Sinan; Department of Computer Engineering (2015)
Border Ownership (BO) signifies which side of an image border owns the border. This information is very important for many computer vision problems. There are various approaches for estimating BO in the literature. One approach is to use methods that rely on low-level local features; combinations of local visual cues such as convexity or junctions and using spectral features have been proven to be quite effective. Alternatively, global constraints or cues can be imposed on top of local cue predictions to ma...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
E. Aras, “Analysis of security criteria for block ciphers,” Middle East Technical University, 1999.