nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A common criteria based security requirements engineering process for the development of secure information systems
|
Mellado, Daniel |
|
2007 |
29 |
2 |
p. 244-253 10 p. |
artikel |
2 |
A hybrid load balancing policy underlying grid computing environment
|
Yan, K.Q. |
|
2007 |
29 |
2 |
p. 161-173 13 p. |
artikel |
3 |
A lightweight and anonymous copyright-protection protocol
|
Chen, Tzung-Her |
|
2007 |
29 |
2 |
p. 229-237 9 p. |
artikel |
4 |
An exploratory investigation of two internet-based communication modes
|
Huang, Albert H. |
|
2007 |
29 |
2 |
p. 238-243 6 p. |
artikel |
5 |
A novel proxy key generation protocol and its application
|
Hu, Xiaoming |
|
2007 |
29 |
2 |
p. 191-195 5 p. |
artikel |
6 |
Call for Papers
|
|
|
2007 |
29 |
2 |
p. I- 1 p. |
artikel |
7 |
Editorial Board
|
|
|
2007 |
29 |
2 |
p. iii- 1 p. |
artikel |
8 |
Enhanced event structures: Towards a true concurrency semantics for E-LOTOS
|
Kapus-Kolar, M. |
|
2007 |
29 |
2 |
p. 205-215 11 p. |
artikel |
9 |
Erratum to “Non-interactive deniable authentication protocol based on factoring”[Computer Standards & Interfaces 27 (2005) 401–405]
|
Lu, Rongxing |
|
2007 |
29 |
2 |
p. 275- 1 p. |
artikel |
10 |
Evaluation of service management algorithms in a distributed web search system
|
Patel, Ahmed |
|
2007 |
29 |
2 |
p. 152-160 9 p. |
artikel |
11 |
Improving four-parameter sine wave fitting by normalization
|
Chen, Kui-Fu |
|
2007 |
29 |
2 |
p. 184-190 7 p. |
artikel |
12 |
Measures of retaining digital evidence to prosecute computer-based cyber-crimes
|
Wang, Shiuh-Jeng |
|
2007 |
29 |
2 |
p. 216-223 8 p. |
artikel |
13 |
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
|
Chien, Hung-Yu |
|
2007 |
29 |
2 |
p. 254-259 6 p. |
artikel |
14 |
On the condition of four-parameter sine wave fitting
|
Chen, Kui-Fu |
|
2007 |
29 |
2 |
p. 174-183 10 p. |
artikel |
15 |
Special Issue on: “Industrial Networking Standards for Real-time Automation and Control”
|
|
|
2007 |
29 |
2 |
p. II- 1 p. |
artikel |
16 |
Standards for image annotation using Semantic Web
|
Khan, Latifur |
|
2007 |
29 |
2 |
p. 196-204 9 p. |
artikel |
17 |
The security analyses of RosettaNet in Grid
|
Liu, Jingwei |
|
2007 |
29 |
2 |
p. 224-228 5 p. |
artikel |
18 |
Threshold key issuing in identity-based cryptosystems
|
Gangishetti, Raju |
|
2007 |
29 |
2 |
p. 260-264 5 p. |
artikel |
19 |
Using a multi-criteria decision making approach to evaluate mobile phone alternatives
|
Işıklar, Gülfem |
|
2007 |
29 |
2 |
p. 265-274 10 p. |
artikel |
20 |
Verification and conformance test generation of communication protocol for railway signaling systems
|
Lee, Jae-Dong |
|
2007 |
29 |
2 |
p. 143-151 9 p. |
artikel |