Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             33 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A controllable and accountable state-oriented Card-Aided Firewall Huang, Jyh-Win
2009
31 1 p. 66-76
11 p.
artikel
2 A fuzzy-based Power-aware management for mobile ad hoc networks Yan, Kuo-Qin
2009
31 1 p. 209-218
10 p.
artikel
3 A multiplatform Java wrapper for the BioAPI framework González-Agulla, Elisardo
2009
31 1 p. 186-191
6 p.
artikel
4 An action refinement operator for E-LOTOS with true concurrency Kapus-Kolar, M.
2009
31 1 p. 77-87
11 p.
artikel
5 An analysis of conformance issues in implementations of standardized security protocols Izquierdo, Antonio
2009
31 1 p. 246-251
6 p.
artikel
6 An efficient coordination scheme between layers of grid architecture Li, Chunlin
2009
31 1 p. 110-119
10 p.
artikel
7 A new image secret sharing scheme to identify cheaters Zhao, Rong
2009
31 1 p. 252-257
6 p.
artikel
8 A new standard of on-line customer service process: Integrating language-action into blogs Yang, Heng-Li
2009
31 1 p. 227-245
19 p.
artikel
9 An improved bilinear pairing based remote user authentication scheme Goriparthi, Thulasi
2009
31 1 p. 181-185
5 p.
artikel
10 Area and time efficient AB 2 multipliers based on cellular automata Kim, Hyun-Sung
2009
31 1 p. 137-143
7 p.
artikel
11 A remote user authentication scheme without using smart cards Rhee, Hyun Sook
2009
31 1 p. 6-13
8 p.
artikel
12 A secure dynamic ID based remote user authentication scheme for multi-server environment Liao, Yi-Pin
2009
31 1 p. 24-29
6 p.
artikel
13 Comment on Saeednia et al.'s strong designated verifier signature scheme Lee, Ji-Seon
2009
31 1 p. 258-260
3 p.
artikel
14 Cryptanalysis and improvement of a threshold proxy signature scheme Hu, Jianghong
2009
31 1 p. 169-173
5 p.
artikel
15 Cryptanalysis of the application secure alternative to SNMP (APSSNMP) Phan, Raphael C.-W.
2009
31 1 p. 63-65
3 p.
artikel
16 Determining the mobile commerce user requirements using an analytic approach Büyüközkan, Gülçin
2009
31 1 p. 144-152
9 p.
artikel
17 Editorial Board 2009
31 1 p. iii-
1 p.
artikel
18 Efficient migration for mobile computing in distributed networks Huang, Kuo-Hsuan
2009
31 1 p. 40-47
8 p.
artikel
19 Exploring the implementation and application of Bluetooth technology in the shipping industry Tarn, J. Michael
2009
31 1 p. 48-55
8 p.
artikel
20 Identity based signcryption scheme without random oracles Yu, Yong
2009
31 1 p. 56-62
7 p.
artikel
21 LAMED — A PRNG for EPC Class-1 Generation-2 RFID specification Peris-Lopez, Pedro
2009
31 1 p. 88-97
10 p.
artikel
22 Managing redundancy in CAN-based networks supporting N-Version Programming Proenza, Julián
2009
31 1 p. 120-127
8 p.
artikel
23 Mechanisms for communication between business and IT experts Kilov, Haim
2009
31 1 p. 98-109
12 p.
artikel
24 MPLS over ATM and IP over ATM methods for multimedia applications Kocak, Cemal
2009
31 1 p. 153-160
8 p.
artikel
25 On the security of a copyright protection scheme based on visual cryptography Chen, Tzung-Her
2009
31 1 p. 1-5
5 p.
artikel
26 Performance evaluation of MAC layer of LnCP and LonWorks protocol as home networking system Lee, Suk
2009
31 1 p. 161-168
8 p.
artikel
27 RETRACTED: The software engineering model's categories of compliance Kaushik, Sharat
2009
31 1 p. 14-18
5 p.
artikel
28 Secure and efficient group key management with shared key derivation Lin, Jen-Chiun
2009
31 1 p. 192-208
17 p.
artikel
29 Secure multiple-times proxy signature scheme Hong, Xuan
2009
31 1 p. 19-23
5 p.
artikel
30 Semantic interoperability in eGovernment initiatives Guijarro, Luis
2009
31 1 p. 174-180
7 p.
artikel
31 The anatomy study of server-initial agreement for general hierarchy wired/wireless networks Cheng, Chien-Fu
2009
31 1 p. 219-226
8 p.
artikel
32 USIM-based EAP-TLS authentication protocol for wireless local area networks Tseng, Yuh-Min
2009
31 1 p. 128-136
9 p.
artikel
33 Virtual machines for distributed real-time systems Cereia, Marco
2009
31 1 p. 30-39
10 p.
artikel
                             33 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland