Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             20 results found
no title author magazine year volume issue page(s) type
1 A collaborative framework for intrusion detection in mobile networks Andreolini, Mauro
2015
321 C p. 179-192
14 p.
article
2 A multi-objective evolutionary algorithm for the tuning of fuzzy rule bases for uncoordinated intersections in autonomous driving Onieva, E.
2015
321 C p. 14-30
17 p.
article
3 A non-uniform multi-rate control strategy for a Markov chain-driven Networked Control System Cuenca, Ángel
2015
321 C p. 31-47
17 p.
article
4 A novel consumer-centric card management architecture and potential security issues Akram, Raja Naeem
2015
321 C p. 150-161
12 p.
article
5 A provable authenticated group key agreement protocol for mobile environment Sun, Hung-Min
2015
321 C p. 224-237
14 p.
article
6 A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks He, Debiao
2015
321 C p. 263-277
15 p.
article
7 Authentication scheme for mobile OFDM based on security information technology of physical layer over time-variant and multipath fading channels (William) Chin, Wen-Long
2015
321 C p. 238-249
12 p.
article
8 Common influence region problems Fort, M.
2015
321 C p. 116-135
20 p.
article
9 Detection of copy–move image forgery using histogram of orientated gradients Lee, Jen-Chun
2015
321 C p. 250-262
13 p.
article
10 Identity-based quotable ring signature Wang, Kefeng
2015
321 C p. 71-89
19 p.
article
11 Inside Front Cover - Editorial Board 2015
321 C p. IFC-
1 p.
article
12 Note on distance measure of hesitant fuzzy sets Li, Deqing
2015
321 C p. 103-115
13 p.
article
13 On learning of weights through preferences Aggarwal, Manish
2015
321 C p. 90-102
13 p.
article
14 Optimality conditions for generalized differentiable interval-valued functions Osuna-Gómez, R.
2015
321 C p. 136-146
11 p.
article
15 Participatory Learner Modelling Design: A methodology for iterative learner models development Cocea, Mihaela
2015
321 C p. 48-70
23 p.
article
16 Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity Wang, Ding
2015
321 C p. 162-178
17 p.
article
17 Probabilistic receiver-location privacy protection in wireless sensor networks Rios, Ruben
2015
321 C p. 205-223
19 p.
article
18 Security and privacy information technologies and applications for wireless pervasive computing environments Wang, Shiuh-Jeng
2015
321 C p. 147-149
3 p.
article
19 Simple and effective method for detecting abnormal internet behaviors of mobile devices Chen, Patrick Shicheng
2015
321 C p. 193-204
12 p.
article
20 Visualizing network communities with a semi-definite programming method Li, Wenye
2015
321 C p. 1-13
13 p.
article
                             20 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands