Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             25 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A binary images watermarking algorithm based on adaptable matrix Zhang, Fan
2008
13 5 p. 595-599
artikel
2 A mobile accessible closed multi-part group communication scheme in IPv6 network Chen, Yue
2008
13 5 p. 600-604
artikel
3 Analysis and improvement of cross-realm client-to-client password authenticated key exchange protocols Ding, Xiaofei
2008
13 5 p. 572-576
artikel
4 An approach for handling conflicts in authorization Zhang, Mingsheng
2008
13 5 p. 626-630
artikel
5 An efficient certificateless ring signature scheme Zhu, Lijun
2008
13 5 p. 567-571
artikel
6 A new chaotic function and its cryptographic usage Zhou, Xueguang
2008
13 5 p. 557-561
artikel
7 A new provably-secure key agreement protocol for roaming in mobile networks Li, Guangsong
2008
13 5 p. 605-608
artikel
8 An improved simple power attack against Camellia’s key schedule Liu, Shuanggen
2008
13 5 p. 591-594
artikel
9 A novel trust enhanced grid authentication mechanism Wang, Haiyan
2008
13 5 p. 528-532
artikel
10 A Peer-to-Peer resource sharing scheme using trusted computing technology Chen, Lu
2008
13 5 p. 523-527
artikel
11 A protocol for fair electronic purchase based on concurrent signatures Li, Xiangdong
2008
13 5 p. 609-614
artikel
12 Attribute-based re-encryption scheme in the standard model Guo, Shanqing
2008
13 5 p. 621-625
artikel
13 BBACIMA: A trustworthy integrity measurement architecture through behavior-based TPM access control Yu, Aimin
2008
13 5 p. 513-518
artikel
14 Breaking and repairing the certificateless key agreement protocol from ASIAN 2006 Xia, Liang
2008
13 5 p. 562-566
artikel
15 Chrestenson spectrum and auto-correlation function of inverse permutations of quick trickle permutations Wang, Jue
2008
13 5 p. 587-590
artikel
16 Formal analysis on an extended security model for database systems Zhu, Hong
2008
13 5 p. 519-522
artikel
17 Forward-secure digital signature scheme with tamper evidence Jiang, Han
2008
13 5 p. 582-586
artikel
18 On k-error linear complexity of some explicit nonlinear pseudorandom sequences Chen, Zhixiong
2008
13 5 p. 577-581
artikel
19 Preventing dropping packets attack in sensor networks: A game theory approach Yang, Libin
2008
13 5 p. 631-635
artikel
20 Privacy-preserving trust negotiation with hidden credentials and hidden policies in a multi-party environment Guo, Shanqing
2008
13 5 p. 553-556
artikel
21 Secure localization algorithm based on node cooperative for sensor networks Ma, Jianguo
2008
13 5 p. 636-640
artikel
22 Static extracting method of software intended behavior based on API functions invoking Peng, Guojun
2008
13 5 p. 615-620
artikel
23 Survivability of components assembly in architecture Guo, Wei
2008
13 5 p. 533-538
artikel
24 TPM context manager and dynamic configuration management for trusted virtualization platform Qin, Yu
2008
13 5 p. 539-546
artikel
25 Trustworthy metrics models for internetware Zhang, Yang
2008
13 5 p. 547-552
artikel
                             25 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland