Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             36 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A conference key agreement protocol with fault-tolerant capability Huang, Kuo-Hsuan
2009
31 2 p. 401-405
5 p.
artikel
2 A modified phoneme-based Chinese input method for minimizing conflict code rate Tung, Cheng-Huang
2009
31 2 p. 292-299
8 p.
artikel
3 An efficient anonymous proxy signature scheme with provable security Yu, Yong
2009
31 2 p. 348-353
6 p.
artikel
4 A new provably secure authentication and key agreement protocol for SIP using ECC Wu, Liufei
2009
31 2 p. 286-291
6 p.
artikel
5 An extension to the ADL SCORM standard to support adaptivity: The t-learning case-study Rey-López, Marta
2009
31 2 p. 309-318
10 p.
artikel
6 A novel access control protocol for secure sensor networks Huang, Hui-Feng
2009
31 2 p. 272-276
5 p.
artikel
7 A novel application of grey system theory to information security (Part I) Shen, Victor R.L.
2009
31 2 p. 277-281
5 p.
artikel
8 A personal Web page tailoring toolkit for mobile devices Kao, Yung-Wei
2009
31 2 p. 437-453
17 p.
artikel
9 Application of session initiation protocol to networked sensor interfaces Chunshan, Shen
2009
31 2 p. 454-457
4 p.
artikel
10 A privacy problem on Hu–Huang's proxy key generation protocol Park, Haeryong
2009
31 2 p. 480-483
4 p.
artikel
11 Assessment of portlet quality: Collecting real experience Moraga, Ma Ángeles
2009
31 2 p. 336-347
12 p.
artikel
12 Attack on a semi-blind watermarking scheme based on singular value decomposition Ting, Grace C.-W.
2009
31 2 p. 523-525
3 p.
artikel
13 A VHDL-based protocol controller for NCAP processors Rossi, S.R.
2009
31 2 p. 515-522
8 p.
artikel
14 Broadband system to increase bitrate in train communication networks Rodríguez-Morcillo, C.
2009
31 2 p. 261-271
11 p.
artikel
15 Building self-optimized communication systems based on applicative cross-layer information Exposito, Ernesto
2009
31 2 p. 354-361
8 p.
artikel
16 Chameleon hash without key exposure based on Schnorr signature Gao, Wei
2009
31 2 p. 282-285
4 p.
artikel
17 Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard Peris-Lopez, Pedro
2009
31 2 p. 372-380
9 p.
artikel
18 Cryptanalysis of Lee–Hwang–Yang blind signature scheme Fan, Chun-I
2009
31 2 p. 319-320
2 p.
artikel
19 Data hiding method using image interpolation Jung, Ki-Hyun
2009
31 2 p. 465-470
6 p.
artikel
20 Design methodology for battery powered embedded systems — In safety critical application Chowdury, Joydeb Roy
2009
31 2 p. 499-503
5 p.
artikel
21 Design of electronic t-out-of-n lotteries on the Internet Lee, Jung-San
2009
31 2 p. 395-400
6 p.
artikel
22 Developing and implementing an open and non-proprietary device description for FOUNDATION fieldbus based on software standards Pantoni, Rodrigo Palucci
2009
31 2 p. 504-514
11 p.
artikel
23 Development of verification and conformance testing tools for a railway signaling communication protocol Lee, Jae-Ho
2009
31 2 p. 362-371
10 p.
artikel
24 Editorial Board 2009
31 2 p. iii-
1 p.
artikel
25 Efficient and provably-secure certificateless short signature scheme from bilinear pairings Du, Hongzhen
2009
31 2 p. 390-394
5 p.
artikel
26 Enabling interoperability for LMS educational services Muñoz-Merino, Pedro J.
2009
31 2 p. 484-498
15 p.
artikel
27 Formal apparatus for measurement of lightweight protocols Trček, Denis
2009
31 2 p. 305-308
4 p.
artikel
28 Generating routing table for free roaming mobile agent in distributed environment Venkatesan, S.
2009
31 2 p. 428-436
9 p.
artikel
29 Hiding data in spatial domain images with distortion tolerance Lin, Iuon-Chang
2009
31 2 p. 458-464
7 p.
artikel
30 Message estimation for universal steganalysis using multi-classification support vector machine Lou, Der-Chyuan
2009
31 2 p. 420-427
8 p.
artikel
31 Multiple layer data hiding scheme for medical images Lou, Der-Chyuan
2009
31 2 p. 329-335
7 p.
artikel
32 Network Application Programming Interface over Session Initiation Protocol, a novel approach to the global roaming environment Huang, Tzu-Chi
2009
31 2 p. 406-419
14 p.
artikel
33 Privacy-preserving e-payments using one-time payment details Ashrafi, Mafruz Zaman
2009
31 2 p. 321-328
8 p.
artikel
34 Process control interface system for a distillation plant Téllez-Anguiano, A.
2009
31 2 p. 471-479
9 p.
artikel
35 Roaming across wireless local area networks using SIM-based authentication protocol Tsai, Hao-Chuan
2009
31 2 p. 381-389
9 p.
artikel
36 Threshold authenticated encryption scheme using labor-division signature Chung, Yu Fang
2009
31 2 p. 300-304
5 p.
artikel
                             36 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland