nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptable Decentralized Service Oriented Architecture
|
Safi Esfahani, Faramarz |
|
2011 |
84 |
10 |
p. 1591-1617 27 p. |
artikel |
2 |
A general (k, n) scalable secret image sharing scheme with the smooth scalability
|
Yang, Ching-Nung |
|
2011 |
84 |
10 |
p. 1726-1733 8 p. |
artikel |
3 |
A geographic routing hybrid approach for void resolution in wireless sensor networks
|
Denardin, Gustavo Weber |
|
2011 |
84 |
10 |
p. 1577-1590 14 p. |
artikel |
4 |
A grid-based coverage approach for target tracking in hybrid sensor networks
|
Lin, Jenn-Wei |
|
2011 |
84 |
10 |
p. 1746-1756 11 p. |
artikel |
5 |
A meet-in-the-middle attack on reduced-round ARIA
|
Tang, Xuehai |
|
2011 |
84 |
10 |
p. 1685-1692 8 p. |
artikel |
6 |
An aspect-oriented reference architecture for Software Engineering Environments
|
Nakagawa, Elisa Y. |
|
2011 |
84 |
10 |
p. 1670-1684 15 p. |
artikel |
7 |
An efficient CRT-RSA algorithm secure against power and fault attacks
|
Kim, Sung-Kyoung |
|
2011 |
84 |
10 |
p. 1660-1669 10 p. |
artikel |
8 |
Boosting adaptivity of fault-tolerant scheduling for real-time tasks with service requirements on clusters
|
Zhu, Xiaomin |
|
2011 |
84 |
10 |
p. 1708-1716 9 p. |
artikel |
9 |
Confidential deniable authentication using promised signcryption
|
Hwang, Shin-Jia |
|
2011 |
84 |
10 |
p. 1652-1659 8 p. |
artikel |
10 |
Editorial Board
|
|
|
2011 |
84 |
10 |
p. CO2- 1 p. |
artikel |
11 |
Engineering the authoring of usable service front ends
|
PaternĂ², Fabio |
|
2011 |
84 |
10 |
p. 1806-1822 17 p. |
artikel |
12 |
Exploiting social networks to provide privacy in personalized web search
|
Erola, Arnau |
|
2011 |
84 |
10 |
p. 1734-1745 12 p. |
artikel |
13 |
Formal analysis of an electronic voting system: An experience report
|
Weldemariam, Komminist |
|
2011 |
84 |
10 |
p. 1618-1637 20 p. |
artikel |
14 |
Identification of extract method refactoring opportunities for the decomposition of methods
|
Tsantalis, Nikolaos |
|
2011 |
84 |
10 |
p. 1757-1782 26 p. |
artikel |
15 |
Improving security of q-SDH based digital signatures
|
Guo, Fuchun |
|
2011 |
84 |
10 |
p. 1783-1790 8 p. |
artikel |
16 |
New and efficient knowledge discovery of partial periodic patterns with multiple minimum supports
|
Chen, Shih-Sheng |
|
2011 |
84 |
10 |
p. 1638-1651 14 p. |
artikel |
17 |
On software verification for sensor nodes
|
Bucur, Doina |
|
2011 |
84 |
10 |
p. 1693-1707 15 p. |
artikel |
18 |
Policy-based Awareness Management (PAM): Case study of a wireless communication system at a hospital
|
Talaei-Khoei, Amir |
|
2011 |
84 |
10 |
p. 1791-1805 15 p. |
artikel |
19 |
Provably secure and efficient authentication techniques for the global mobility network
|
Lee, Tian-Fu |
|
2011 |
84 |
10 |
p. 1717-1725 9 p. |
artikel |