nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A logic-based safety analysis algorithm for discretionary access control
|
Yan, Xuexiong |
|
2012 |
17 |
6 |
p. 531-538 |
artikel |
2 |
An integrated open forensic environment for digital evidence investigation
|
Zhang, Jun |
|
2012 |
17 |
6 |
p. 511-515 |
artikel |
3 |
A punching scheme for crossing NAT in end hopping
|
Lin, Kai |
|
2012 |
17 |
6 |
p. 539-543 |
artikel |
4 |
A Semantic-aware method for polymorphic signature generation
|
Guo, Fan |
|
2012 |
17 |
6 |
p. 494-498 |
artikel |
5 |
Comparison of SETAM with security use case and security misuse case: A software security testing study
|
Hui, Zhanwei |
|
2012 |
17 |
6 |
p. 516-520 |
artikel |
6 |
Elliptic curves in Huff’s model
|
Wu, Hongfeng |
|
2012 |
17 |
6 |
p. 473-480 |
artikel |
7 |
Fault-propagate pattern based DFA on PRESENT and PRINTcipher
|
Zhao, Xinjie |
|
2012 |
17 |
6 |
p. 485-493 |
artikel |
8 |
Grid services trusted authentication algorithm based on image trusted root in scale space
|
Liu, Lizhao |
|
2012 |
17 |
6 |
p. 521-530 |
artikel |
9 |
Linear complexity problem of binary Jacobi sequence
|
Yan, Tongjiang |
|
2012 |
17 |
6 |
p. 481-484 |
artikel |
10 |
Localization in 3D sensor networks using stochastic particle swarm optimization
|
Zhang, Zhangxue |
|
2012 |
17 |
6 |
p. 544-548 |
artikel |
11 |
MSMAM: Testing resources allocation, obtaining non-functional indexes based on functional testing results, and evaluating security
|
Cao, Hui |
|
2012 |
17 |
6 |
p. 504-510 |
artikel |
12 |
New chaotic image encryption algorithm based on cross-mapping
|
Tong, Xiaojun |
|
2012 |
17 |
6 |
p. 461-467 |
artikel |
13 |
Off-line dictionary attack on password-based authenticated key exchange protocols
|
Xu, Chungen |
|
2012 |
17 |
6 |
p. 468-472 |
artikel |
14 |
Security analysis of an electronic commerce protocol using casper/FDR2
|
Chang, Yinlong |
|
2012 |
17 |
6 |
p. 499-503 |
artikel |