nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A conference key agreement protocol with fault-tolerant capability
|
Huang, Kuo-Hsuan |
|
2009 |
31 |
2 |
p. 401-405 5 p. |
artikel |
2 |
A modified phoneme-based Chinese input method for minimizing conflict code rate
|
Tung, Cheng-Huang |
|
2009 |
31 |
2 |
p. 292-299 8 p. |
artikel |
3 |
An efficient anonymous proxy signature scheme with provable security
|
Yu, Yong |
|
2009 |
31 |
2 |
p. 348-353 6 p. |
artikel |
4 |
A new provably secure authentication and key agreement protocol for SIP using ECC
|
Wu, Liufei |
|
2009 |
31 |
2 |
p. 286-291 6 p. |
artikel |
5 |
An extension to the ADL SCORM standard to support adaptivity: The t-learning case-study
|
Rey-López, Marta |
|
2009 |
31 |
2 |
p. 309-318 10 p. |
artikel |
6 |
A novel access control protocol for secure sensor networks
|
Huang, Hui-Feng |
|
2009 |
31 |
2 |
p. 272-276 5 p. |
artikel |
7 |
A novel application of grey system theory to information security (Part I)
|
Shen, Victor R.L. |
|
2009 |
31 |
2 |
p. 277-281 5 p. |
artikel |
8 |
A personal Web page tailoring toolkit for mobile devices
|
Kao, Yung-Wei |
|
2009 |
31 |
2 |
p. 437-453 17 p. |
artikel |
9 |
Application of session initiation protocol to networked sensor interfaces
|
Chunshan, Shen |
|
2009 |
31 |
2 |
p. 454-457 4 p. |
artikel |
10 |
A privacy problem on Hu–Huang's proxy key generation protocol
|
Park, Haeryong |
|
2009 |
31 |
2 |
p. 480-483 4 p. |
artikel |
11 |
Assessment of portlet quality: Collecting real experience
|
Moraga, Ma Ángeles |
|
2009 |
31 |
2 |
p. 336-347 12 p. |
artikel |
12 |
Attack on a semi-blind watermarking scheme based on singular value decomposition
|
Ting, Grace C.-W. |
|
2009 |
31 |
2 |
p. 523-525 3 p. |
artikel |
13 |
A VHDL-based protocol controller for NCAP processors
|
Rossi, S.R. |
|
2009 |
31 |
2 |
p. 515-522 8 p. |
artikel |
14 |
Broadband system to increase bitrate in train communication networks
|
Rodríguez-Morcillo, C. |
|
2009 |
31 |
2 |
p. 261-271 11 p. |
artikel |
15 |
Building self-optimized communication systems based on applicative cross-layer information
|
Exposito, Ernesto |
|
2009 |
31 |
2 |
p. 354-361 8 p. |
artikel |
16 |
Chameleon hash without key exposure based on Schnorr signature
|
Gao, Wei |
|
2009 |
31 |
2 |
p. 282-285 4 p. |
artikel |
17 |
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
|
Peris-Lopez, Pedro |
|
2009 |
31 |
2 |
p. 372-380 9 p. |
artikel |
18 |
Cryptanalysis of Lee–Hwang–Yang blind signature scheme
|
Fan, Chun-I |
|
2009 |
31 |
2 |
p. 319-320 2 p. |
artikel |
19 |
Data hiding method using image interpolation
|
Jung, Ki-Hyun |
|
2009 |
31 |
2 |
p. 465-470 6 p. |
artikel |
20 |
Design methodology for battery powered embedded systems — In safety critical application
|
Chowdury, Joydeb Roy |
|
2009 |
31 |
2 |
p. 499-503 5 p. |
artikel |
21 |
Design of electronic t-out-of-n lotteries on the Internet
|
Lee, Jung-San |
|
2009 |
31 |
2 |
p. 395-400 6 p. |
artikel |
22 |
Developing and implementing an open and non-proprietary device description for FOUNDATION fieldbus based on software standards
|
Pantoni, Rodrigo Palucci |
|
2009 |
31 |
2 |
p. 504-514 11 p. |
artikel |
23 |
Development of verification and conformance testing tools for a railway signaling communication protocol
|
Lee, Jae-Ho |
|
2009 |
31 |
2 |
p. 362-371 10 p. |
artikel |
24 |
Editorial Board
|
|
|
2009 |
31 |
2 |
p. iii- 1 p. |
artikel |
25 |
Efficient and provably-secure certificateless short signature scheme from bilinear pairings
|
Du, Hongzhen |
|
2009 |
31 |
2 |
p. 390-394 5 p. |
artikel |
26 |
Enabling interoperability for LMS educational services
|
Muñoz-Merino, Pedro J. |
|
2009 |
31 |
2 |
p. 484-498 15 p. |
artikel |
27 |
Formal apparatus for measurement of lightweight protocols
|
Trček, Denis |
|
2009 |
31 |
2 |
p. 305-308 4 p. |
artikel |
28 |
Generating routing table for free roaming mobile agent in distributed environment
|
Venkatesan, S. |
|
2009 |
31 |
2 |
p. 428-436 9 p. |
artikel |
29 |
Hiding data in spatial domain images with distortion tolerance
|
Lin, Iuon-Chang |
|
2009 |
31 |
2 |
p. 458-464 7 p. |
artikel |
30 |
Message estimation for universal steganalysis using multi-classification support vector machine
|
Lou, Der-Chyuan |
|
2009 |
31 |
2 |
p. 420-427 8 p. |
artikel |
31 |
Multiple layer data hiding scheme for medical images
|
Lou, Der-Chyuan |
|
2009 |
31 |
2 |
p. 329-335 7 p. |
artikel |
32 |
Network Application Programming Interface over Session Initiation Protocol, a novel approach to the global roaming environment
|
Huang, Tzu-Chi |
|
2009 |
31 |
2 |
p. 406-419 14 p. |
artikel |
33 |
Privacy-preserving e-payments using one-time payment details
|
Ashrafi, Mafruz Zaman |
|
2009 |
31 |
2 |
p. 321-328 8 p. |
artikel |
34 |
Process control interface system for a distillation plant
|
Téllez-Anguiano, A. |
|
2009 |
31 |
2 |
p. 471-479 9 p. |
artikel |
35 |
Roaming across wireless local area networks using SIM-based authentication protocol
|
Tsai, Hao-Chuan |
|
2009 |
31 |
2 |
p. 381-389 9 p. |
artikel |
36 |
Threshold authenticated encryption scheme using labor-division signature
|
Chung, Yu Fang |
|
2009 |
31 |
2 |
p. 300-304 5 p. |
artikel |