nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A controllable and accountable state-oriented Card-Aided Firewall
|
Huang, Jyh-Win |
|
2009 |
31 |
1 |
p. 66-76 11 p. |
artikel |
2 |
A fuzzy-based Power-aware management for mobile ad hoc networks
|
Yan, Kuo-Qin |
|
2009 |
31 |
1 |
p. 209-218 10 p. |
artikel |
3 |
A multiplatform Java wrapper for the BioAPI framework
|
González-Agulla, Elisardo |
|
2009 |
31 |
1 |
p. 186-191 6 p. |
artikel |
4 |
An action refinement operator for E-LOTOS with true concurrency
|
Kapus-Kolar, M. |
|
2009 |
31 |
1 |
p. 77-87 11 p. |
artikel |
5 |
An analysis of conformance issues in implementations of standardized security protocols
|
Izquierdo, Antonio |
|
2009 |
31 |
1 |
p. 246-251 6 p. |
artikel |
6 |
An efficient coordination scheme between layers of grid architecture
|
Li, Chunlin |
|
2009 |
31 |
1 |
p. 110-119 10 p. |
artikel |
7 |
A new image secret sharing scheme to identify cheaters
|
Zhao, Rong |
|
2009 |
31 |
1 |
p. 252-257 6 p. |
artikel |
8 |
A new standard of on-line customer service process: Integrating language-action into blogs
|
Yang, Heng-Li |
|
2009 |
31 |
1 |
p. 227-245 19 p. |
artikel |
9 |
An improved bilinear pairing based remote user authentication scheme
|
Goriparthi, Thulasi |
|
2009 |
31 |
1 |
p. 181-185 5 p. |
artikel |
10 |
Area and time efficient AB 2 multipliers based on cellular automata
|
Kim, Hyun-Sung |
|
2009 |
31 |
1 |
p. 137-143 7 p. |
artikel |
11 |
A remote user authentication scheme without using smart cards
|
Rhee, Hyun Sook |
|
2009 |
31 |
1 |
p. 6-13 8 p. |
artikel |
12 |
A secure dynamic ID based remote user authentication scheme for multi-server environment
|
Liao, Yi-Pin |
|
2009 |
31 |
1 |
p. 24-29 6 p. |
artikel |
13 |
Comment on Saeednia et al.'s strong designated verifier signature scheme
|
Lee, Ji-Seon |
|
2009 |
31 |
1 |
p. 258-260 3 p. |
artikel |
14 |
Cryptanalysis and improvement of a threshold proxy signature scheme
|
Hu, Jianghong |
|
2009 |
31 |
1 |
p. 169-173 5 p. |
artikel |
15 |
Cryptanalysis of the application secure alternative to SNMP (APSSNMP)
|
Phan, Raphael C.-W. |
|
2009 |
31 |
1 |
p. 63-65 3 p. |
artikel |
16 |
Determining the mobile commerce user requirements using an analytic approach
|
Büyüközkan, Gülçin |
|
2009 |
31 |
1 |
p. 144-152 9 p. |
artikel |
17 |
Editorial Board
|
|
|
2009 |
31 |
1 |
p. iii- 1 p. |
artikel |
18 |
Efficient migration for mobile computing in distributed networks
|
Huang, Kuo-Hsuan |
|
2009 |
31 |
1 |
p. 40-47 8 p. |
artikel |
19 |
Exploring the implementation and application of Bluetooth technology in the shipping industry
|
Tarn, J. Michael |
|
2009 |
31 |
1 |
p. 48-55 8 p. |
artikel |
20 |
Identity based signcryption scheme without random oracles
|
Yu, Yong |
|
2009 |
31 |
1 |
p. 56-62 7 p. |
artikel |
21 |
LAMED — A PRNG for EPC Class-1 Generation-2 RFID specification
|
Peris-Lopez, Pedro |
|
2009 |
31 |
1 |
p. 88-97 10 p. |
artikel |
22 |
Managing redundancy in CAN-based networks supporting N-Version Programming
|
Proenza, Julián |
|
2009 |
31 |
1 |
p. 120-127 8 p. |
artikel |
23 |
Mechanisms for communication between business and IT experts
|
Kilov, Haim |
|
2009 |
31 |
1 |
p. 98-109 12 p. |
artikel |
24 |
MPLS over ATM and IP over ATM methods for multimedia applications
|
Kocak, Cemal |
|
2009 |
31 |
1 |
p. 153-160 8 p. |
artikel |
25 |
On the security of a copyright protection scheme based on visual cryptography
|
Chen, Tzung-Her |
|
2009 |
31 |
1 |
p. 1-5 5 p. |
artikel |
26 |
Performance evaluation of MAC layer of LnCP and LonWorks protocol as home networking system
|
Lee, Suk |
|
2009 |
31 |
1 |
p. 161-168 8 p. |
artikel |
27 |
RETRACTED: The software engineering model's categories of compliance
|
Kaushik, Sharat |
|
2009 |
31 |
1 |
p. 14-18 5 p. |
artikel |
28 |
Secure and efficient group key management with shared key derivation
|
Lin, Jen-Chiun |
|
2009 |
31 |
1 |
p. 192-208 17 p. |
artikel |
29 |
Secure multiple-times proxy signature scheme
|
Hong, Xuan |
|
2009 |
31 |
1 |
p. 19-23 5 p. |
artikel |
30 |
Semantic interoperability in eGovernment initiatives
|
Guijarro, Luis |
|
2009 |
31 |
1 |
p. 174-180 7 p. |
artikel |
31 |
The anatomy study of server-initial agreement for general hierarchy wired/wireless networks
|
Cheng, Chien-Fu |
|
2009 |
31 |
1 |
p. 219-226 8 p. |
artikel |
32 |
USIM-based EAP-TLS authentication protocol for wireless local area networks
|
Tseng, Yuh-Min |
|
2009 |
31 |
1 |
p. 128-136 9 p. |
artikel |
33 |
Virtual machines for distributed real-time systems
|
Cereia, Marco |
|
2009 |
31 |
1 |
p. 30-39 10 p. |
artikel |