nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving reliable and secure services in cloud computing environments
|
Liu, Qin |
|
2017 |
59 |
C |
p. 153-164 12 p. |
artikel |
2 |
A client-side detection mechanism for evil twins
|
Hsu, Fu-Hau |
|
2017 |
59 |
C |
p. 76-85 10 p. |
artikel |
3 |
An analytical study of biometric based remote user authentication schemes using smart cards
|
Limbasiya, Trupil |
|
2017 |
59 |
C |
p. 305-321 17 p. |
artikel |
4 |
Applying episode mining and pruning to identify malicious online attacks
|
Su, Ming-Yang |
|
2017 |
59 |
C |
p. 180-188 9 p. |
artikel |
5 |
A third eye with human-computer interaction for the visually impaired
|
Başçiftçi, Fatih |
|
2017 |
59 |
C |
p. 63-72 10 p. |
artikel |
6 |
A two way authentication using bilinear mapping function for wireless sensor networks
|
Ramachandran, Shyamala |
|
2017 |
59 |
C |
p. 242-249 8 p. |
artikel |
7 |
Cellular automata based secure distributed storage scheme with integrity proof
|
Zhou, Yousheng |
|
2017 |
59 |
C |
p. 291-304 14 p. |
artikel |
8 |
Cloud security: Emerging threats and current solutions
|
Coppolino, Luigi |
|
2017 |
59 |
C |
p. 126-140 15 p. |
artikel |
9 |
Cryptanalysis and improvement on anonymous three-factor authentication scheme for mobile networks
|
Xie, Qi |
|
2017 |
59 |
C |
p. 218-230 13 p. |
artikel |
10 |
DDoS victim service containment to minimize the internal collateral damages in cloud computing
|
Somani, Gaurav |
|
2017 |
59 |
C |
p. 165-179 15 p. |
artikel |
11 |
Development of Rough Set – Hypergraph Technique for Key Feature Identification in Intrusion Detection Systems
|
Gauthama Raman, M R |
|
2017 |
59 |
C |
p. 189-200 12 p. |
artikel |
12 |
Dynamic anomaly detection using cross layer security in MANET
|
Usha, G. |
|
2017 |
59 |
C |
p. 231-241 11 p. |
artikel |
13 |
Editorial Board
|
|
|
2017 |
59 |
C |
p. IFC- 1 p. |
artikel |
14 |
Extended 3PAKE authentication scheme for value-added services in VANETs
|
Muthumeenakshi, R. |
|
2017 |
59 |
C |
p. 27-38 12 p. |
artikel |
15 |
Introduction to the Special Section on Challenges and Solutions in Mobile Systems Security
|
Parakh, Abhishek |
|
2017 |
59 |
C |
p. 201-203 3 p. |
artikel |
16 |
Introduction to the Special Section on Critical Systems Modelling and Security
|
Garcia-Alfaro, Joaquin |
|
2017 |
59 |
C |
p. 73-75 3 p. |
artikel |
17 |
Monitoring system reaction in cyber-physical testbed under cyber-attacks
|
Bernieri, Giuseppe |
|
2017 |
59 |
C |
p. 86-98 13 p. |
artikel |
18 |
Multi-agent trust-based intrusion detection scheme for wireless sensor networks
|
Jin, Xianji |
|
2017 |
59 |
C |
p. 262-273 12 p. |
artikel |
19 |
Multifaceted trust management framework based on a trust level agreement in a collaborative cloud
|
P, Varalakshmi |
|
2017 |
59 |
C |
p. 110-125 16 p. |
artikel |
20 |
Netlet: A simple and versatile network middleware for peer-to-peer application program
|
Lyu, Zehua |
|
2017 |
59 |
C |
p. 1-14 14 p. |
artikel |
21 |
Polynomial and multivariate mapping-based triple-key approach for secure key distribution in wireless sensor networks
|
A., Selva Reegan |
|
2017 |
59 |
C |
p. 274-290 17 p. |
artikel |
22 |
Randomly prioritized buffer-less routing architecture for 3D Network on Chip
|
Karthikeyan, A. |
|
2017 |
59 |
C |
p. 39-50 12 p. |
artikel |
23 |
Secure and scalable control plane for intra-domain publish-subscribe communication
|
Alzahrani, Bander A. |
|
2017 |
59 |
C |
p. 51-62 12 p. |
artikel |
24 |
Secure user authentication scheme for wireless healthcare sensor networks
|
Liu, Chia-Hui |
|
2017 |
59 |
C |
p. 250-261 12 p. |
artikel |
25 |
State of the art and challenges of security SLA for cloud computing
|
Carvalho, Carlos André Batista de |
|
2017 |
59 |
C |
p. 141-152 12 p. |
artikel |
26 |
The design of secure mobile coupon mechanism with the implementation for NFC smartphones
|
Chen, Yu-Yi |
|
2017 |
59 |
C |
p. 204-217 14 p. |
artikel |
27 |
Towards real-time crops surveillance for disease classification: exploiting parallelism in computer vision
|
Akram, Tallha |
|
2017 |
59 |
C |
p. 15-26 12 p. |
artikel |
28 |
VAP code: A secure graphical password for smart devices
|
Azad, Saiful |
|
2017 |
59 |
C |
p. 99-109 11 p. |
artikel |