Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             27 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comparative simulation study on the power–performance of multi-core architecture Saravanan, Vijayalakshmi
2014
70 1 p. 465-487
artikel
2 An anonymous e-rental protocol based on ID-based cryptography and NFC Luo, Jia Ning
2013
70 1 p. 31-53
artikel
3 An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures Hsieh, Wen-Bin
2014
70 1 p. 133-148
artikel
4 An efficient mutual authentication RFID scheme based on elliptic curve cryptography Chou, Jue-Sam
2013
70 1 p. 75-94
artikel
5 An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks Tu, Hang
2014
70 1 p. 224-235
artikel
6 A study on security strategy in ICT convergence environment Lee, Chang-Moo
2014
70 1 p. 211-223
artikel
7 Biclique cryptanalysis of PRESENT-80 and PRESENT-128 Lee, Changhoon
2014
70 1 p. 95-103
artikel
8 Cloud computing in e-Science: research challenges and opportunities Yang, Xiaoyu
2014
70 1 p. 408-464
artikel
9 Converting random bits into random numbers Koo, Bonwook
2014
70 1 p. 236-246
artikel
10 Design and analysis of a secure and effective emergency system for mountaineering events Chen, Chin-Ling
2013
70 1 p. 54-74
artikel
11 Detection and analysis of secure intelligent universal designated verifier signature scheme for electronic voting system Zuo, Liming
2014
70 1 p. 177-199
artikel
12 Distributed generic approximate sparse inverses Gravvanis, George A.
2014
70 1 p. 365-384
artikel
13 Editorial of special section on Hybrid Information Security Technologies: part II Yeo, Sangsoo
2014
70 1 p. 1-2
artikel
14 Exploiting controlled-grained parallelism in message-driven stream programs Su, Yan
2014
70 1 p. 488-509
artikel
15 High performance data clustering: a comparative analysis of performance for GPU, RASC, MPI, and OpenMP implementations Yang, Luobin
2013
70 1 p. 284-300
artikel
16 Improved deleted file recovery technique for Ext2/3 filesystem Lee, Seokjun
2014
70 1 p. 20-30
artikel
17 Microarchitectural performance comparison of Intel Knights Corner and Intel Sandy Bridge with CFD applications Che, Yonggang
2014
70 1 p. 321-348
artikel
18 Modeling computational limitations in H-Phy and Overlay-NoC architectures Zydek, Dawid
2013
70 1 p. 301-320
artikel
19 Multilayer cluster designing algorithm for lifetime improvement of wireless sensor networks Jabbar, Sohail
2014
70 1 p. 104-132
artikel
20 Performance scalability and energy consumption on distributed and many-core platforms Karanikolaou, E. M.
2014
70 1 p. 349-364
artikel
21 Probabilistic odd–even: an adaptive wormhole routing algorithm for 2D mesh network-on-chip Hu, Su
2014
70 1 p. 385-407
artikel
22 Secure and efficient high-performance PROOF-based cluster system for high-energy physics Ahn, Sang Un
2014
70 1 p. 166-176
artikel
23 Secure and reliable electronic record management system using digital forensic technologies Majore, Sekie Amanuel
2014
70 1 p. 149-165
artikel
24 Secure component composition with modular behavioral properties Kim, Hyongsoon
2014
70 1 p. 3-19
artikel
25 StoryCube: supporting children’s storytelling with a tangible tool Wang, Danli
2013
70 1 p. 269-283
artikel
26 Updating the trusted connection of re-organized computing resource under the automated system management platform Yoon, Heejun
2014
70 1 p. 200-210
artikel
27 Visible watermarking with reversibility of multimedia images for ownership declarations Hsu, Fu-Hau
2014
70 1 p. 247-268
artikel
                             27 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland