nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptation in current e-learning systems
|
Ruiz, Ma del Puerto Paule |
|
2008 |
30 |
1-2 |
p. 62-70 9 p. |
artikel |
2 |
An energy efficient and delay sensitive centralized MAC protocol for wireless sensor networks
|
Ceken, Celal |
|
2008 |
30 |
1-2 |
p. 20-31 12 p. |
artikel |
3 |
An open source forensic tool to visualize digital evidence
|
Vlastos, Emmanouil |
|
2008 |
30 |
1-2 |
p. 8-19 12 p. |
artikel |
4 |
A study on e-Taiwan information system security classification and implementation
|
Farn, Kwo-Jean |
|
2008 |
30 |
1-2 |
p. 1-7 7 p. |
artikel |
5 |
Attacks on a robust watermarking scheme based on self-reference image
|
Ting, Grace C.-W. |
|
2008 |
30 |
1-2 |
p. 32-35 4 p. |
artikel |
6 |
A user-oriented ontology-based approach for network intrusion detection
|
Hung, Shao-Shin |
|
2008 |
30 |
1-2 |
p. 78-88 11 p. |
artikel |
7 |
Communication-efficient AUTHMAC_DH protocols
|
Lee, Tian-Fu |
|
2008 |
30 |
1-2 |
p. 71-77 7 p. |
artikel |
8 |
Editorial Board
|
|
|
2008 |
30 |
1-2 |
p. iii- 1 p. |
artikel |
9 |
Enhancement of fairness in a DiffServ network using a novel queuing algorithm
|
Huang, Yi-Hung |
|
2008 |
30 |
1-2 |
p. 52-61 10 p. |
artikel |
10 |
Feasibility and infrastructural study of AR interfacing and intuitive simulation on 3D nonlinear systems
|
Kim, Seungjun |
|
2008 |
30 |
1-2 |
p. 36-51 16 p. |
artikel |
11 |
Indentity-based broadcast signcryption
|
Li, Fagen |
|
2008 |
30 |
1-2 |
p. 89-94 6 p. |
artikel |
12 |
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks
|
Chen, Hsing-Bai |
|
2008 |
30 |
1-2 |
p. 95-99 5 p. |
artikel |