Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             46 results found
no title author magazine year volume issue page(s) type
1 Accurate SPICE compatible CNT interconnect and CNTFET models for circuit design and simulation Yamacli, Serhan
2013
58 1-2 p. 368-378
11 p.
article
2 A goal-driven approach for adaptive service composition using planning Song, Seheon
2013
58 1-2 p. 261-273
13 p.
article
3 A new logo watermarking based on redundant fractional wavelet transform Bhatnagar, Gaurav
2013
58 1-2 p. 204-218
15 p.
article
4 A novel authenticated encryption scheme with convertibility Thadvai, Sandeep
2013
58 1-2 p. 178-185
8 p.
article
5 A novel image-based implicit password authentication system (IPAS) for mobile and non-mobile devices Almuairfi, Sadiq
2013
58 1-2 p. 108-116
9 p.
article
6 A novel smart card and dynamic ID based remote user authentication scheme for multi-server environments Li, Xiong
2013
58 1-2 p. 85-95
11 p.
article
7 A numerical method for handling boundary and transmission conditions Assous, Franck
2013
58 1-2 p. 393-402
10 p.
article
8 A secure electronic cash based on a certificateless group signcryption scheme Mohanty, Sujata
2013
58 1-2 p. 186-195
10 p.
article
9 A study of the security of Internet banking and financial private information in South Korea Lee, Jung Hyun
2013
58 1-2 p. 117-131
15 p.
article
10 A study on business opportunity for small smart devices in finance Lee, Hong Joo
2013
58 1-2 p. 172-177
6 p.
article
11 A support vector machine approach to CMOS-based radar signal processing for vehicle classification and speed estimation Cho, Hsun-Jung
2013
58 1-2 p. 438-448
11 p.
article
12 B2B evaluation framework on e financial guarantee service Kim, Yanghoon
2013
58 1-2 p. 49-55
7 p.
article
13 Blind image watermarking method based on chaotic key and dynamic coefficient quantization in the DWT domain Keyvanpour, MohammadReza
2013
58 1-2 p. 56-67
12 p.
article
14 Computer simulation of electron energy state spin-splitting in nanoscale InAs/GaAs semiconductor quantum rings Li, Yiming
2013
58 1-2 p. 300-305
6 p.
article
15 CVaR measurement and operational risk management in commercial banks according to the peak value method of extreme value theory Yao, Fengge
2013
58 1-2 p. 15-27
13 p.
article
16 Design and implementation of an efficient defense mechanism against ARP spoofing attacks using AES and RSA Hong, Seungpyo
2013
58 1-2 p. 254-260
7 p.
article
17 Editorial Board 2013
58 1-2 p. iii-iv
nvt p.
article
18 Expectation-maximization based algorithm for pattern recognition in traffic speed distribution Lo, Shih-Ching
2013
58 1-2 p. 449-456
8 p.
article
19 Fast segmentation and adaptive SURF descriptor for iris recognition Mehrotra, Hunny
2013
58 1-2 p. 132-146
15 p.
article
20 Financial IT and Security Chang, Hangbae
2013
58 1-2 p. 1-2
2 p.
article
21 Finite-element-wise domain decomposition iterative solvers with polynomial preconditioning Liang, Yu
2013
58 1-2 p. 421-437
17 p.
article
22 First principles modeling of charged oxygen vacancy filaments in reduced TiO2–implications to the operation of non-volatile memory devices Zhao, Liang
2013
58 1-2 p. 275-281
7 p.
article
23 Geometric programming approach to doping profile design optimization of metal-oxide-semiconductor devices Li, Yiming
2013
58 1-2 p. 344-354
11 p.
article
24 Hybrid algorithms for hardware/software partitioning and scheduling on reconfigurable devices Liu, Peng
2013
58 1-2 p. 409-420
12 p.
article
25 Identity-based partially blind signature in the standard model for electronic cash Li, Fagen
2013
58 1-2 p. 196-203
8 p.
article
26 Impact of impedance-dependent receiver gain on the extracted channel thermal noise in sub-100 nm MOSFETs Chen, Chih-Hung
2013
58 1-2 p. 355-362
8 p.
article
27 Is ISMS for financial organizations effective on their business? Chang, Hangbae
2013
58 1-2 p. 79-84
6 p.
article
28 Legitimate-reader-only attack on MIFARE Classic Liu, Ya
2013
58 1-2 p. 219-226
8 p.
article
29 Matrix representation of the double-curl operator for simulating three dimensional photonic crystals Huang, Tsung-Ming
2013
58 1-2 p. 379-392
14 p.
article
30 Modeling miniband for realistic silicon nanocrystal array Hu, Weiguo
2013
58 1-2 p. 306-311
6 p.
article
31 Modeling of transient drain current overshoot in polycrystalline silicon thin-film transistors Kamakura, Yoshinari
2013
58 1-2 p. 363-367
5 p.
article
32 MSRC: (M)icropayment (S)cheme with ability to (R)eturn (C)hanges Yang, Ching-Nung
2013
58 1-2 p. 96-107
12 p.
article
33 Multiband treatment of quantum transport in anisotropic semiconductors: Non-equilibrium Green’s function Chen, Chun-Nan
2013
58 1-2 p. 282-287
6 p.
article
34 Multi-recastable e-bidding game with dual-blindness Fan, Chun-I
2013
58 1-2 p. 68-78
11 p.
article
35 [No title] Li, Yiming
2013
58 1-2 p. 274-
1 p.
article
36 On gender differences in consumer behavior for online financial transaction of cosmetics Liu, Wan-Yu
2013
58 1-2 p. 238-253
16 p.
article
37 Optical TCAD on the Net: A tight-binding study of inter-band light transitions in self-assembled InAs/GaAs quantum dot photodetectors Ryu, Hoon
2013
58 1-2 p. 288-299
12 p.
article
38 Option valuation by a self-exciting threshold binomial model Yuen, Fei Lung
2013
58 1-2 p. 28-37
10 p.
article
39 Probabilistic trust aware data replica placement strategy for online video streaming applications in vehicular delay tolerant networks Kumar, Neeraj
2013
58 1-2 p. 3-14
12 p.
article
40 Scattering basis representation in ballistic transport simulations of nanowire transistors Mil’nikov, Gennady
2013
58 1-2 p. 312-320
9 p.
article
41 Simulation of a double-gate MOSFET by a non-parabolic energy-transport subband model for semiconductors based on the maximum entropy principle Camiola, Vito Dario
2013
58 1-2 p. 321-343
23 p.
article
42 The study of defined buying factors affecting trust building and service performance in financial management systems Kim, Kughee
2013
58 1-2 p. 38-48
11 p.
article
43 Ultra-wide band microwave image reconstruction for early breast cancer detection by norm constrained capon beamforming Xu, Li
2013
58 1-2 p. 403-408
6 p.
article
44 Use of geometric features of principal components for indexing a biometric database Jayaraman, Umarani
2013
58 1-2 p. 147-164
18 p.
article
45 User efficient recoverable off-line e-cash scheme with fast anonymity revoking Fan, Chun-I
2013
58 1-2 p. 227-237
11 p.
article
46 Verifier-based computation-and communication-efficient 3EKE protocols Yoon, Eun-Jun
2013
58 1-2 p. 165-171
7 p.
article
                             46 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands