nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analysis of Sun et al.’s linkability attack on some proxy blind signature schemes
|
Wu, Lin-Chuan |
|
2006 |
79 |
2 |
p. 176-179 4 p. |
artikel |
2 |
An efficient and secure protocol for sensor network time synchronization
|
Farrugia, Emerson |
|
2006 |
79 |
2 |
p. 147-162 16 p. |
artikel |
3 |
A scheduling framework for enterprise services
|
Tsetsos, Vassileios |
|
2006 |
79 |
2 |
p. 259-272 14 p. |
artikel |
4 |
Assessment of eco-security in the Knowledge Grid e-science environment
|
Shi, Xiaoqing |
|
2006 |
79 |
2 |
p. 246-252 7 p. |
artikel |
5 |
Call for Papers
|
|
|
2006 |
79 |
2 |
p. I-II nvt p. |
artikel |
6 |
Comparing requirements analysis methods for developing reusable component libraries
|
Sutcliffe, Alistair |
|
2006 |
79 |
2 |
p. 273-289 17 p. |
artikel |
7 |
Editorial Board
|
|
|
2006 |
79 |
2 |
p. iii-iv nvt p. |
artikel |
8 |
Efficient evaluation of linear path expressions on large-scale heterogeneous XML documents using information retrieval techniques
|
Park, Young-Ho |
|
2006 |
79 |
2 |
p. 180-190 11 p. |
artikel |
9 |
Hotswapping Linux kernel modules
|
Lee, Yueh-Feng |
|
2006 |
79 |
2 |
p. 163-175 13 p. |
artikel |
10 |
Odyssey-Search: A multi-agent system for component information search and retrieval
|
Braga, Regina M.M. |
|
2006 |
79 |
2 |
p. 204-215 12 p. |
artikel |
11 |
On the security of the Yen–Guo’s domino signal encryption algorithm (DSEA)
|
Li, Chengqing |
|
2006 |
79 |
2 |
p. 253-258 6 p. |
artikel |
12 |
Polyhedral space generation and memory estimation from interface and memory models of real-time video systems
|
Thörnberg, Benny |
|
2006 |
79 |
2 |
p. 231-245 15 p. |
artikel |
13 |
Shape-based retrieval in time-series databases
|
Kim, Sang-Wook |
|
2006 |
79 |
2 |
p. 191-203 13 p. |
artikel |
14 |
Shortening retrieval sequences in browsing-based component retrieval using information entropy
|
Li, Ge |
|
2006 |
79 |
2 |
p. 216-230 15 p. |
artikel |