Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             18 results found
no title author magazine year volume issue page(s) type
1 A biometric-based user authentication for wireless sensor networks Yuan, Jianjun
2010
15 3 p. 272-276
article
2 A dynamic ID-based authenticated group key exchange protocol without pairings Xie, Liyun
2010
15 3 p. 255-260
article
3 A message digest disposing algorithm based on RC4 Liu, Yabin
2010
15 3 p. 251-254
article
4 An efficient two-party key exchange protocol with strong security Deng, Shaofeng
2010
15 3 p. 267-271
article
5 A security patch for a three-party key exchange protocol Zhao, Jianjie
2010
15 3 p. 242-246
article
6 A trustworthiness-based distribution model for data leakage prevention Fan, Yin
2010
15 3 p. 205-209
article
7 A usable selection range standard based on test suite reduction algorithms Ma, Yanjun
2010
15 3 p. 261-266
article
8 Construction of high dependable distributed access control architecture based on quorum system Xiong, Tinggang
2010
15 3 p. 210-216
article
9 Efficient broadcast encryption scheme based on number theory research unit Zhang, Weidong
2010
15 3 p. 247-250
article
10 Fault-tolerant rate-monotonic compact-factor-driven scheduling in hard-real-time systems Zhu, Ping
2010
15 3 p. 217-221
article
11 Generation algorithm of a sort of P-permutations Han, Haiqing
2010
15 3 p. 237-241
article
12 Massive data covert transmission scheme based on Shamir threshold Zhang, Tao
2010
15 3 p. 227-231
article
13 New constructions of identity-based threshold decryption Zhang, Leyou
2010
15 3 p. 222-226
article
14 Remote attestation-based access control on trusted computing platform Liu, Xian’gang
2010
15 3 p. 190-194
article
15 11-Round impossible differential algebraic attack for serpent encryption algorithm Hu, Zhihua
2010
15 3 p. 232-236
article
16 Static analysis-based behavior model building for trusted computing dynamic verification Yu, Fajiang
2010
15 3 p. 195-200
article
17 Trust asymmetry in grid authentication Wang, Haiyan
2010
15 3 p. 201-204
article
18 vCerberus: A DRTM system based on virtualization technology Chen, Wenzhi
2010
15 3 p. 185-189
article
                             18 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands