nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A client-based customization framework for web applications using JNLP
|
Artail, Hassan A. |
|
2004 |
26 |
5 |
p. 411-422 12 p. |
artikel |
2 |
A novel three-party encrypted key exchange protocol
|
Chang, Chin-Chen |
|
2004 |
26 |
5 |
p. 471-476 6 p. |
artikel |
3 |
A practical authenticated encryption scheme based on the elliptic curve cryptosystem
|
Chen, Tzer-Shyong |
|
2004 |
26 |
5 |
p. 461-469 9 p. |
artikel |
4 |
Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers
|
Wu, Tzong-Sun |
|
2004 |
26 |
5 |
p. 477-481 5 p. |
artikel |
5 |
Design and implementation of a mobile database for Java phones
|
Lu, Eric Jui-Lin |
|
2004 |
26 |
5 |
p. 401-410 10 p. |
artikel |
6 |
Designing an XML-based context-aware transformation framework for mobile execution environments using CC/PP and XSLT
|
Kao, Tzu-Han |
|
2004 |
26 |
5 |
p. 377-399 23 p. |
artikel |
7 |
Direct construction of a secret in generalized group-oriented cryptography
|
Wang, Shiuh-Jeng |
|
2004 |
26 |
5 |
p. 455-460 6 p. |
artikel |
8 |
Editorial Board
|
|
|
2004 |
26 |
5 |
p. iii- 1 p. |
artikel |
9 |
Efficient access control and key management schemes for mobile agents
|
Lin, Iuon-Chang |
|
2004 |
26 |
5 |
p. 423-433 11 p. |
artikel |
10 |
Efficient deniable authentication protocol based on generalized ElGamal signature scheme
|
Shao, Zuhua |
|
2004 |
26 |
5 |
p. 449-454 6 p. |
artikel |
11 |
Modeling the effect of hot spot contention on crossbar multiprocessors
|
Chang, Her-Kun |
|
2004 |
26 |
5 |
p. 483-488 6 p. |
artikel |
12 |
Nearly a special issue on cryptography
|
Schumny, Harald |
|
2004 |
26 |
5 |
p. 375-376 2 p. |
artikel |
13 |
Special Issue Call for Papers
|
|
|
2004 |
26 |
5 |
p. I- 1 p. |
artikel |
14 |
The new territory of mobile agreement
|
Wang, S.C. |
|
2004 |
26 |
5 |
p. 435-447 13 p. |
artikel |