Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             20 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A collaborative framework for intrusion detection in mobile networks Andreolini, Mauro
2015
321 C p. 179-192
14 p.
artikel
2 A multi-objective evolutionary algorithm for the tuning of fuzzy rule bases for uncoordinated intersections in autonomous driving Onieva, E.
2015
321 C p. 14-30
17 p.
artikel
3 A non-uniform multi-rate control strategy for a Markov chain-driven Networked Control System Cuenca, Ángel
2015
321 C p. 31-47
17 p.
artikel
4 A novel consumer-centric card management architecture and potential security issues Akram, Raja Naeem
2015
321 C p. 150-161
12 p.
artikel
5 A provable authenticated group key agreement protocol for mobile environment Sun, Hung-Min
2015
321 C p. 224-237
14 p.
artikel
6 A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks He, Debiao
2015
321 C p. 263-277
15 p.
artikel
7 Authentication scheme for mobile OFDM based on security information technology of physical layer over time-variant and multipath fading channels (William) Chin, Wen-Long
2015
321 C p. 238-249
12 p.
artikel
8 Common influence region problems Fort, M.
2015
321 C p. 116-135
20 p.
artikel
9 Detection of copy–move image forgery using histogram of orientated gradients Lee, Jen-Chun
2015
321 C p. 250-262
13 p.
artikel
10 Identity-based quotable ring signature Wang, Kefeng
2015
321 C p. 71-89
19 p.
artikel
11 Inside Front Cover - Editorial Board 2015
321 C p. IFC-
1 p.
artikel
12 Note on distance measure of hesitant fuzzy sets Li, Deqing
2015
321 C p. 103-115
13 p.
artikel
13 On learning of weights through preferences Aggarwal, Manish
2015
321 C p. 90-102
13 p.
artikel
14 Optimality conditions for generalized differentiable interval-valued functions Osuna-Gómez, R.
2015
321 C p. 136-146
11 p.
artikel
15 Participatory Learner Modelling Design: A methodology for iterative learner models development Cocea, Mihaela
2015
321 C p. 48-70
23 p.
artikel
16 Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity Wang, Ding
2015
321 C p. 162-178
17 p.
artikel
17 Probabilistic receiver-location privacy protection in wireless sensor networks Rios, Ruben
2015
321 C p. 205-223
19 p.
artikel
18 Security and privacy information technologies and applications for wireless pervasive computing environments Wang, Shiuh-Jeng
2015
321 C p. 147-149
3 p.
artikel
19 Simple and effective method for detecting abnormal internet behaviors of mobile devices Chen, Patrick Shicheng
2015
321 C p. 193-204
12 p.
artikel
20 Visualizing network communities with a semi-definite programming method Li, Wenye
2015
321 C p. 1-13
13 p.
artikel
                             20 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland