Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             21 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 An efficient cost optimized scheduling for spot instances in heterogeneous cloud environment Domanal, Shridhar G.

84 C p. 11-21
artikel
2 An efficient key agreement protocol for Sybil-precaution in online social networks Al-Qurishi, Muhammad

84 C p. 139-148
artikel
3 Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment Feng, Qi

84 C p. 239-251
artikel
4 An optimization of virtual machine selection and placement by using memory content similarity for server consolidation in cloud Li, Huixi

84 C p. 98-107
artikel
5 A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs Islam, SK Hafizul

84 C p. 216-227
artikel
6 A secure chaotic map-based remote authentication scheme for telecare medicine information systems Li, Xiong

84 C p. 149-159
artikel
7 A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring Ali, Rifaqat

84 C p. 200-215
artikel
8 A similarity-aware encrypted deduplication scheme with flexible access control in the cloud Zhou, Yukun

84 C p. 177-189
artikel
9 Cross-domain dynamic anonymous authenticated group key management with symptom-matching for e-health social system Yang, Yang

84 C p. 160-176
artikel
10 Decentralized and locality aware replication method for DHT-based P2P storage systems Hassanzadeh-Nazarabadi, Yahya

84 C p. 32-46
artikel
11 Design and hardware implementation of a security-enhanced elliptic curve cryptography based lightweight authentication scheme for smart grid communications Abbasinezhad-Mood, Dariush

84 C p. 47-57
artikel
12 Editorial Board
84 C p. ii
artikel
13 Event-driven approach for predictive and proactive management of SLA violations in the Cloud of Things Nawaz, Falak

84 C p. 78-97
artikel
14 Filtering irrelevant sequential data out of game session telemetry though similarity collapses Kohwalter, Troy

84 C p. 108-122
artikel
15 Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage Guo, Cheng

84 C p. 190-199
artikel
16 Key management and key distribution for secure group communication in mobile and cloud network Vijayakumar, P.

84 C p. 123-125
artikel
17 LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions Chen, Zitao

84 C p. 126-138
artikel
18 Mimic computing for password recovery Li, Bin

84 C p. 58-77
artikel
19 On the adequacy of lightweight thread approaches for high-level parallel programming models Castelló, Adrián

84 C p. 22-31
artikel
20 Power domain NOMA to support group communication in public safety networks Su, Xin

84 C p. 228-238
artikel
21 T1000: Mitigating the memory footprint of convolution neural networks with decomposition and re-fusion Liu, Changxi

84 C p. 1-10
artikel
                             21 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland