Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             18 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A biometric-based user authentication for wireless sensor networks Yuan, Jianjun
2010
15 3 p. 272-276
artikel
2 A dynamic ID-based authenticated group key exchange protocol without pairings Xie, Liyun
2010
15 3 p. 255-260
artikel
3 A message digest disposing algorithm based on RC4 Liu, Yabin
2010
15 3 p. 251-254
artikel
4 An efficient two-party key exchange protocol with strong security Deng, Shaofeng
2010
15 3 p. 267-271
artikel
5 A security patch for a three-party key exchange protocol Zhao, Jianjie
2010
15 3 p. 242-246
artikel
6 A trustworthiness-based distribution model for data leakage prevention Fan, Yin
2010
15 3 p. 205-209
artikel
7 A usable selection range standard based on test suite reduction algorithms Ma, Yanjun
2010
15 3 p. 261-266
artikel
8 Construction of high dependable distributed access control architecture based on quorum system Xiong, Tinggang
2010
15 3 p. 210-216
artikel
9 Efficient broadcast encryption scheme based on number theory research unit Zhang, Weidong
2010
15 3 p. 247-250
artikel
10 Fault-tolerant rate-monotonic compact-factor-driven scheduling in hard-real-time systems Zhu, Ping
2010
15 3 p. 217-221
artikel
11 Generation algorithm of a sort of P-permutations Han, Haiqing
2010
15 3 p. 237-241
artikel
12 Massive data covert transmission scheme based on Shamir threshold Zhang, Tao
2010
15 3 p. 227-231
artikel
13 New constructions of identity-based threshold decryption Zhang, Leyou
2010
15 3 p. 222-226
artikel
14 Remote attestation-based access control on trusted computing platform Liu, Xian’gang
2010
15 3 p. 190-194
artikel
15 11-Round impossible differential algebraic attack for serpent encryption algorithm Hu, Zhihua
2010
15 3 p. 232-236
artikel
16 Static analysis-based behavior model building for trusted computing dynamic verification Yu, Fajiang
2010
15 3 p. 195-200
artikel
17 Trust asymmetry in grid authentication Wang, Haiyan
2010
15 3 p. 201-204
artikel
18 vCerberus: A DRTM system based on virtualization technology Chen, Wenzhi
2010
15 3 p. 185-189
artikel
                             18 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland