nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An adaptive push-styled command and control mechanism in mobile botnets
|
Chen, Wei |
|
2013 |
18 |
5 |
p. 427-434 |
artikel |
2 |
An anonymous data collection framework for digital community
|
Li, Hongtao |
|
2013 |
18 |
5 |
p. 385-392 |
artikel |
3 |
A novel fuzzy keyword retrieval scheme over encrypted cloud data
|
Tian, Ke |
|
2013 |
18 |
5 |
p. 393-401 |
artikel |
4 |
A novel secret sharing scheme based on minimal linear codes
|
Li, Zhihui |
|
2013 |
18 |
5 |
p. 407-412 |
artikel |
5 |
An unknown Trojan detection method based on software network behavior
|
Liang, Yu |
|
2013 |
18 |
5 |
p. 369-376 |
artikel |
6 |
Application of improved PSO-LSSVM on network threat detection
|
Qi, Fumin |
|
2013 |
18 |
5 |
p. 418-426 |
artikel |
7 |
A privacy protection method for continuous query based on location services
|
Hu, Wenling |
|
2013 |
18 |
5 |
p. 449-454 |
artikel |
8 |
A quantum error-correction circuit based on cyclic code
|
Lü, Hongjun |
|
2013 |
18 |
5 |
p. 413-417 |
artikel |
9 |
Formulations of some bit switching functions in DES
|
You, Lin |
|
2013 |
18 |
5 |
p. 402-406 |
artikel |
10 |
G bytes data hiding method based on cluster chain structure
|
Niu, Xiaopeng |
|
2013 |
18 |
5 |
p. 443-448 |
artikel |
11 |
Homomorphic MAC-based scheme against pollution attacks in network coding
|
Zhang, Yujie |
|
2013 |
18 |
5 |
p. 435-442 |
artikel |
12 |
Information transfer model of virtual machine based on storage covert channel
|
Wang, Xiaorui |
|
2013 |
18 |
5 |
p. 377-384 |
artikel |
13 |
Reversible audio watermarking algorithm using non-causal prediction
|
Huo, Yongjin |
|
2013 |
18 |
5 |
p. 455-460 |
artikel |