nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative simulation study on the power–performance of multi-core architecture
|
Saravanan, Vijayalakshmi |
|
2014 |
70 |
1 |
p. 465-487 |
artikel |
2 |
An anonymous e-rental protocol based on ID-based cryptography and NFC
|
Luo, Jia Ning |
|
2013 |
70 |
1 |
p. 31-53 |
artikel |
3 |
An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures
|
Hsieh, Wen-Bin |
|
2014 |
70 |
1 |
p. 133-148 |
artikel |
4 |
An efficient mutual authentication RFID scheme based on elliptic curve cryptography
|
Chou, Jue-Sam |
|
2013 |
70 |
1 |
p. 75-94 |
artikel |
5 |
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks
|
Tu, Hang |
|
2014 |
70 |
1 |
p. 224-235 |
artikel |
6 |
A study on security strategy in ICT convergence environment
|
Lee, Chang-Moo |
|
2014 |
70 |
1 |
p. 211-223 |
artikel |
7 |
Biclique cryptanalysis of PRESENT-80 and PRESENT-128
|
Lee, Changhoon |
|
2014 |
70 |
1 |
p. 95-103 |
artikel |
8 |
Cloud computing in e-Science: research challenges and opportunities
|
Yang, Xiaoyu |
|
2014 |
70 |
1 |
p. 408-464 |
artikel |
9 |
Converting random bits into random numbers
|
Koo, Bonwook |
|
2014 |
70 |
1 |
p. 236-246 |
artikel |
10 |
Design and analysis of a secure and effective emergency system for mountaineering events
|
Chen, Chin-Ling |
|
2013 |
70 |
1 |
p. 54-74 |
artikel |
11 |
Detection and analysis of secure intelligent universal designated verifier signature scheme for electronic voting system
|
Zuo, Liming |
|
2014 |
70 |
1 |
p. 177-199 |
artikel |
12 |
Distributed generic approximate sparse inverses
|
Gravvanis, George A. |
|
2014 |
70 |
1 |
p. 365-384 |
artikel |
13 |
Editorial of special section on Hybrid Information Security Technologies: part II
|
Yeo, Sangsoo |
|
2014 |
70 |
1 |
p. 1-2 |
artikel |
14 |
Exploiting controlled-grained parallelism in message-driven stream programs
|
Su, Yan |
|
2014 |
70 |
1 |
p. 488-509 |
artikel |
15 |
High performance data clustering: a comparative analysis of performance for GPU, RASC, MPI, and OpenMP implementations
|
Yang, Luobin |
|
2013 |
70 |
1 |
p. 284-300 |
artikel |
16 |
Improved deleted file recovery technique for Ext2/3 filesystem
|
Lee, Seokjun |
|
2014 |
70 |
1 |
p. 20-30 |
artikel |
17 |
Microarchitectural performance comparison of Intel Knights Corner and Intel Sandy Bridge with CFD applications
|
Che, Yonggang |
|
2014 |
70 |
1 |
p. 321-348 |
artikel |
18 |
Modeling computational limitations in H-Phy and Overlay-NoC architectures
|
Zydek, Dawid |
|
2013 |
70 |
1 |
p. 301-320 |
artikel |
19 |
Multilayer cluster designing algorithm for lifetime improvement of wireless sensor networks
|
Jabbar, Sohail |
|
2014 |
70 |
1 |
p. 104-132 |
artikel |
20 |
Performance scalability and energy consumption on distributed and many-core platforms
|
Karanikolaou, E. M. |
|
2014 |
70 |
1 |
p. 349-364 |
artikel |
21 |
Probabilistic odd–even: an adaptive wormhole routing algorithm for 2D mesh network-on-chip
|
Hu, Su |
|
2014 |
70 |
1 |
p. 385-407 |
artikel |
22 |
Secure and efficient high-performance PROOF-based cluster system for high-energy physics
|
Ahn, Sang Un |
|
2014 |
70 |
1 |
p. 166-176 |
artikel |
23 |
Secure and reliable electronic record management system using digital forensic technologies
|
Majore, Sekie Amanuel |
|
2014 |
70 |
1 |
p. 149-165 |
artikel |
24 |
Secure component composition with modular behavioral properties
|
Kim, Hyongsoon |
|
2014 |
70 |
1 |
p. 3-19 |
artikel |
25 |
StoryCube: supporting children’s storytelling with a tangible tool
|
Wang, Danli |
|
2013 |
70 |
1 |
p. 269-283 |
artikel |
26 |
Updating the trusted connection of re-organized computing resource under the automated system management platform
|
Yoon, Heejun |
|
2014 |
70 |
1 |
p. 200-210 |
artikel |
27 |
Visible watermarking with reversibility of multimedia images for ownership declarations
|
Hsu, Fu-Hau |
|
2014 |
70 |
1 |
p. 247-268 |
artikel |