Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 Adaptation in current e-learning systems Ruiz, Ma del Puerto Paule
2008
30 1-2 p. 62-70
9 p.
article
2 An energy efficient and delay sensitive centralized MAC protocol for wireless sensor networks Ceken, Celal
2008
30 1-2 p. 20-31
12 p.
article
3 An open source forensic tool to visualize digital evidence Vlastos, Emmanouil
2008
30 1-2 p. 8-19
12 p.
article
4 A study on e-Taiwan information system security classification and implementation Farn, Kwo-Jean
2008
30 1-2 p. 1-7
7 p.
article
5 Attacks on a robust watermarking scheme based on self-reference image Ting, Grace C.-W.
2008
30 1-2 p. 32-35
4 p.
article
6 A user-oriented ontology-based approach for network intrusion detection Hung, Shao-Shin
2008
30 1-2 p. 78-88
11 p.
article
7 Communication-efficient AUTHMAC_DH protocols Lee, Tian-Fu
2008
30 1-2 p. 71-77
7 p.
article
8 Editorial Board 2008
30 1-2 p. iii-
1 p.
article
9 Enhancement of fairness in a DiffServ network using a novel queuing algorithm Huang, Yi-Hung
2008
30 1-2 p. 52-61
10 p.
article
10 Feasibility and infrastructural study of AR interfacing and intuitive simulation on 3D nonlinear systems Kim, Seungjun
2008
30 1-2 p. 36-51
16 p.
article
11 Indentity-based broadcast signcryption Li, Fagen
2008
30 1-2 p. 89-94
6 p.
article
12 Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks Chen, Hsing-Bai
2008
30 1-2 p. 95-99
5 p.
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands