Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             19 results found
no title author magazine year volume issue page(s) type
1 A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment Kim, Hakjae
2009
31 6 p. 1098-1107
10 p.
article
2 An efficient and provable secure identity-based ring signcryption scheme Zhu, ZhenChao
2009
31 6 p. 1092-1097
6 p.
article
3 An efficient implementation algorithm for generating de Bruijn sequences Zhang, Weiguo
2009
31 6 p. 1190-1191
2 p.
article
4 A new algorithm for encryption/decryption for field applications Ramasamy, Rajaram
2009
31 6 p. 1069-1072
4 p.
article
5 Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems Choi, Eun Young
2009
31 6 p. 1124-1130
7 p.
article
6 Architectural impact of the SVG-based graphical components in web applications Moreno, Edward David
2009
31 6 p. 1150-1157
8 p.
article
7 Business to business interoperability: A current review of XML data integration standards Lampathaki, Fenareti
2009
31 6 p. 1045-1055
11 p.
article
8 Cryptanalysis of two three-party encrypted key exchange protocols Lo, N.W.
2009
31 6 p. 1167-1174
8 p.
article
9 Data hiding based on compressed VQ indices of images Shie, Shih-Chieh
2009
31 6 p. 1143-1149
7 p.
article
10 Designing distributed software with RT-CORBA and SDL Díaz, Manuel
2009
31 6 p. 1073-1091
19 p.
article
11 Editorial Board 2009
31 6 p. iii-
1 p.
article
12 Efficient migration access control for mobile agents Chung, Yu-Fang
2009
31 6 p. 1061-1068
8 p.
article
13 Exploiting an antivirus interface Hamlen, Kevin W.
2009
31 6 p. 1182-1189
8 p.
article
14 Global Interoperability Using Semantics, Standards, Science and Technology (GIS3T) Waters, Jeff
2009
31 6 p. 1158-1166
9 p.
article
15 Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment Hsiang, Han-Cheng
2009
31 6 p. 1118-1123
6 p.
article
16 Mapping standards for home networking van de Kaa, Geerten
2009
31 6 p. 1175-1181
7 p.
article
17 Semantic annotations for web services discovery and composition Talantikite, Hassina Nacer
2009
31 6 p. 1108-1117
10 p.
article
18 Two improved two-party identity-based authenticated key agreement protocols Hölbl, Marko
2009
31 6 p. 1056-1060
5 p.
article
19 Utility-based scheduling for grid computing under constraints of energy budget and deadline Li, Chunlin
2009
31 6 p. 1131-1142
12 p.
article
                             19 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands