nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Contents
|
|
|
2015 |
50 |
C |
p. iii- 1 p. |
artikel |
2 |
DP-Apriori: A differentially private frequent itemset mining algorithm based on transaction splitting
|
Cheng, Xiang |
|
2015 |
50 |
C |
p. 74-90 17 p. |
artikel |
3 |
Editorial Board
|
|
|
2015 |
50 |
C |
p. IFC- 1 p. |
artikel |
4 |
Integrity, authenticity, non-repudiation, and proof of existence for long-term archiving: A survey
|
Vigil, MartÃn |
|
2015 |
50 |
C |
p. 16-32 17 p. |
artikel |
5 |
Intrusion alert prioritisation and attack detection using post-correlation analysis
|
Shittu, Riyanat |
|
2015 |
50 |
C |
p. 1-15 15 p. |
artikel |
6 |
Relay and jammer selection schemes for improving physical layer security in two-way cooperative networks
|
Ibrahim, Doaa H. |
|
2015 |
50 |
C |
p. 47-59 13 p. |
artikel |
7 |
SECO: Secure and scalable data collaboration services in cloud computing
|
Dong, Xin |
|
2015 |
50 |
C |
p. 91-105 15 p. |
artikel |
8 |
Selecting a trusted cloud service provider for your SaaS program
|
Tang, Changlong |
|
2015 |
50 |
C |
p. 60-73 14 p. |
artikel |
9 |
The ultimate control flow transfer in a Java based smart card
|
Bouffard, Guillaume |
|
2015 |
50 |
C |
p. 33-46 14 p. |
artikel |