Academic literature on the topic 'Crypter'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Crypter.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Crypter"
Mewada, Shivlal, Pradeep Sharma, and S. S. Gautam. "Investigation of Efficient Cryptic Algorithm for Text using SM Crypter." International Journal of Information Science and Computing 3, no. 2 (2016): 99. http://dx.doi.org/10.5958/2454-9533.2016.00012.0.
Full textBrochet, Laura. "D�crypter, comprendre�et ma�triser sa pr�sence en ligne." L'Observatoire N�47, no. 1 (2016): 94. http://dx.doi.org/10.3917/lobs.047.0094.
Full textBrisset, Annie. "Traduire le texte dans son projet. Le littéralisme est soluble dans la poésie moderne : Auden." TTR : traduction, terminologie, rédaction 12, no. 2 (2007): 39–56. http://dx.doi.org/10.7202/037370ar.
Full textBachmann, O., B. Riederer, H. Rossmann, et al. "The Na+/H+ exchanger isoform 2 is the predominant NHE isoform in murine colonic crypts and its lack causes NHE3 upregulation." American Journal of Physiology-Gastrointestinal and Liver Physiology 287, no. 1 (2004): G125—G133. http://dx.doi.org/10.1152/ajpgi.00332.2003.
Full textBaker, Ann-Marie, Calum Gabbutt, Marc J. Williams, et al. "Crypt fusion as a homeostatic mechanism in the human colon." Gut 68, no. 11 (2019): 1986–93. http://dx.doi.org/10.1136/gutjnl-2018-317540.
Full textLi, Y. Q., S. A. Roberts, U. Paulus, M. Loeffler, and C. S. Potten. "The crypt cycle in mouse small intestinal epithelium." Journal of Cell Science 107, no. 12 (1994): 3271–79. http://dx.doi.org/10.1242/jcs.107.12.3271.
Full textZaborin, Alexander, Monika Krezalek, Sanjiv Hyoju, et al. "Critical role of microbiota within cecal crypts on the regenerative capacity of the intestinal epithelium following surgical stress." American Journal of Physiology-Gastrointestinal and Liver Physiology 312, no. 2 (2017): G112—G122. http://dx.doi.org/10.1152/ajpgi.00294.2016.
Full textSchmidt, G. H., D. J. Winton, and B. A. Ponder. "Development of the pattern of cell renewal in the crypt-villus unit of chimaeric mouse small intestine." Development 103, no. 4 (1988): 785–90. http://dx.doi.org/10.1242/dev.103.4.785.
Full textMerritt, A. J., C. S. Potten, A. J. Watson, et al. "Differential expression of bcl-2 in intestinal epithelia. Correlation with attenuation of apoptosis in colonic crypts and the incidence of colonic neoplasia." Journal of Cell Science 108, no. 6 (1995): 2261–71. http://dx.doi.org/10.1242/jcs.108.6.2261.
Full textMuncan, Vanesa, Owen J. Sansom, Leon Tertoolen, et al. "Rapid Loss of Intestinal Crypts upon Conditional Deletion of the Wnt/Tcf-4 Target Gene c-Myc." Molecular and Cellular Biology 26, no. 22 (2006): 8418–26. http://dx.doi.org/10.1128/mcb.00821-06.
Full textDissertations / Theses on the topic "Crypter"
Palm, Patrik. "Utvärdering av antivirusskydd mot genererade trojaner : Är de ett hot?" Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-46848.
Full textGalway, Carol. "Wilhelm Busch, cryptic enigma." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/NQ60537.pdf.
Full textLévy, Pascal. "Télécommunications cryptées par chaos." Besançon, 2004. http://www.theses.fr/2004BESA2048.
Full textPatrick, Ardhe, and Sebastian Karlsson. "The crypto catalyst." Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-75548.
Full textRatté, Simon-Pierre. "Du neuf sur la cryptie?" Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ55604.pdf.
Full textFarajallah, Mousa. "Chaos-based crypto and joint crypto-compression systems for images and videos." Nantes, 2015. http://archive.bu.univ-nantes.fr/pollux/show.action?id=3c98f067-1a81-4690-9ac6-a515090c482e.
Full textMELLO, CLAUDIO GOMES DE. "CRYPTO-COMPRESSION PREFIX CODING." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2006. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9932@1.
Full textLo, Gerfo Luisa Maria. "Cryptes, chambres de momification et procédés de conservation des corps(siècles XVIII-XIX) dans le contexte archéologiques et paléopathologique de la Sicile." Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM5026.
Full textTotolici, Alexandru. "CRYPSTOR : a platform for secure storage." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/44603.
Full textHeffelfinger, Blair. "The adherence of Acidiphilium cryptum to chalcopyrite." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/28792.
Full textBooks on the topic "Crypter"
Larcher, Éric. L' Internet sécurisé: Comment crypter ses mails, lutter contre le spam et les virus, protéger son anonymat sur le Web. Eyrolles, 2000.
Find full textParis souterrain: Carrières, catacombes, cryptes, égouts, tunnels = Beneath Paris : quarries, catacombs, crypts, sewers, tunnels. Parigramme, 2007.
Find full textYano, Makoto. Blockchain and Crypto Currency: Building a High Quality Marketplace for Crypt Data. Springer Nature, 2020.
Find full textKlinke, Ian. Cryptic Concrete. John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119261155.
Full textIyer, Tara. Cryptic Connections: Spillovers Between Crypto and Equity Markets. International Monetary Fund, 2022.
Find full textIyer, Tara. Cryptic Connections: Spillovers Between Crypto and Equity Markets. International Monetary Fund, 2022.
Find full textBook chapters on the topic "Crypter"
Kahan, Jeffrey. "Crypts and Crypto-Graphology." In Shakespiritualism. Palgrave Macmillan US, 2013. http://dx.doi.org/10.1057/9781137313553_3.
Full textSwammy, Sarah, Richard Thompson, and Marvin Loh. "Tales from the Crypt: The Dawn of Crypto Currency." In Crypto Uncovered. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00135-3_2.
Full textGross, Isabelle. "Crypts." In Encyclopedia of Cancer. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-642-27841-9_7184-3.
Full textGross, Isabelle. "Crypts." In Encyclopedia of Cancer. Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-46875-3_7184.
Full textTaulli, Tom. "Crypto." In The Personal Finance Guide for Tech Professionals. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8242-7_6.
Full textAnderson, Patrick D. "Crypto!" In Cypherpunk Ethics. Routledge, 2022. http://dx.doi.org/10.4324/9781003220534-2.
Full textHargitai, Henrik. "Cryptic Region." In Encyclopedia of Planetary Landforms. Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-9213-9_93-1.
Full textGullotta, F. "Cryptic Gliomas." In Minimal Neoplasia. Springer Berlin Heidelberg, 1988. http://dx.doi.org/10.1007/978-3-642-83245-1_18.
Full textWhite, Thomas E. "Cryptic Coloration." In Encyclopedia of Animal Cognition and Behavior. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-47829-6_665-1.
Full textHargitai, Henrik. "Cryptic Region." In Encyclopedia of Planetary Landforms. Springer New York, 2015. http://dx.doi.org/10.1007/978-1-4614-3134-3_93.
Full textConference papers on the topic "Crypter"
Ali, Yousif, and Abdul Hameed. "Cloud Crypter for bypassing Antivirus." In 2019 15th International Conference on Emerging Technologies (ICET). IEEE, 2019. http://dx.doi.org/10.1109/icet48972.2019.8994615.
Full textBarria, Cristian, David Cordero, Claudio Cubillos, and Robinson Osses. "Obfuscation procedure based in dead code insertion into crypter." In 2016 6th International Conference on Computers Communications and Control (ICCCC). IEEE, 2016. http://dx.doi.org/10.1109/icccc.2016.7496733.
Full textHuidobro, Cristian Barria, David Cordero, Claudio Cubillos, Hector Allende Cid, and Claudio Casado Barragan. "Obfuscation procedure based on the insertion of the dead code in the crypter by binary search." In 2018 7th International Conference on Computers Communications and Control (ICCCC). IEEE, 2018. http://dx.doi.org/10.1109/icccc.2018.8390457.
Full textDatta, Avishek, Rajdeep Chakraborty, and J. K. Mandal. "The CRYPSTER: A private key Crypto system." In 2015 IEEE International Conference on Computer Graphics, Vision and Information Security (CGVIS). IEEE, 2015. http://dx.doi.org/10.1109/cgvis.2015.7449882.
Full textФедосеев, Н. Ф., and Л. Ю. Пономарев. "Settlement of early Byzantine time at the Kyz-Aul necropolis." In Древности Боспора. Crossref, 2018. http://dx.doi.org/10.25681/iaras.2018.978-5-94375-251-3.257-281.
Full textPopa, Raluca Ada, Catherine M. S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan. "CryptDB." In the Twenty-Third ACM Symposium. ACM Press, 2011. http://dx.doi.org/10.1145/2043556.2043566.
Full textLewis, Jeff. "Cryptol." In the 2007 ACM workshop. ACM Press, 2007. http://dx.doi.org/10.1145/1314436.1314442.
Full textChen, You-Ping, and Ju-Chun Ko. "CryptoAR Wallet." In MobileHCI '19: 21st International Conference on Human-Computer Interaction with Mobile Devices and Services. ACM, 2019. http://dx.doi.org/10.1145/3338286.3344386.
Full textRoy Chowdhury, Amrita, Chenghong Wang, Xi He, Ashwin Machanavajjhala та Somesh Jha. "Cryptϵ". У SIGMOD/PODS '20: International Conference on Management of Data. ACM, 2020. http://dx.doi.org/10.1145/3318464.3380596.
Full textCha, ByungRae. "CRYPTEX Model for Software Source Code." In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.74.
Full textReports on the topic "Crypter"
Cong, Lin William, Xi Li, Ke Tang, and Yang Yang. Crypto Wash Trading. National Bureau of Economic Research, 2022. http://dx.doi.org/10.3386/w30783.
Full textFiorentino, D., U. Gräwe, J. Holstein, J. Dannheim, K H Wiltshire, and T. Brey. Cryptic or simply neglected diversity? Natural Resources Canada/ESS/Scientific and Technical Publishing Services, 2017. http://dx.doi.org/10.4095/305850.
Full textMegonigal, Patrick, and Scott Pitz. Cryptic Methane Emissions from Upland Forest Ecosystems. Office of Scientific and Technical Information (OSTI), 2016. http://dx.doi.org/10.2172/1248029.
Full textDeane, Stephen, and Olivier Fines. Cryptoassets: Beyond the Hype. CFA Institute, 2023. http://dx.doi.org/10.56227/23.1.1.
Full textSmyslov, V. Simple Cryptographic Program Interface (Crypto API). RFC Editor, 1999. http://dx.doi.org/10.17487/rfc2628.
Full textCong, Lin William, Campbell Harvey, Daniel Rabetti, and Zong-Yu Wu. An Anatomy of Crypto-Enabled Cybercrimes. National Bureau of Economic Research, 2023. http://dx.doi.org/10.3386/w30834.
Full textraterman, clay. Decentralized ETFs & Hedge Funds In Crypto. ResearchHub Technologies, Inc., 2022. http://dx.doi.org/10.55277/researchhub.nv9y7pc4.
Full textSoloviev, Vladimir, Victoria Solovieva, Anna Tuliakova, Alexey Hostryk, and Lukáš Pichl. Complex networks theory and precursors of financial crashes. [б. в.], 2020. http://dx.doi.org/10.31812/123456789/4119.
Full textCatalini, Christian, and Joshua Gans. Initial Coin Offerings and the Value of Crypto Tokens. National Bureau of Economic Research, 2018. http://dx.doi.org/10.3386/w24418.
Full textNelson, D., ed. Crypto-Agility Requirements for Remote Authentication Dial-In User Service (RADIUS). RFC Editor, 2011. http://dx.doi.org/10.17487/rfc6421.
Full text