Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             13 results found
no title author magazine year volume issue page(s) type
1 An adaptive push-styled command and control mechanism in mobile botnets Chen, Wei
2013
18 5 p. 427-434
article
2 An anonymous data collection framework for digital community Li, Hongtao
2013
18 5 p. 385-392
article
3 A novel fuzzy keyword retrieval scheme over encrypted cloud data Tian, Ke
2013
18 5 p. 393-401
article
4 A novel secret sharing scheme based on minimal linear codes Li, Zhihui
2013
18 5 p. 407-412
article
5 An unknown Trojan detection method based on software network behavior Liang, Yu
2013
18 5 p. 369-376
article
6 Application of improved PSO-LSSVM on network threat detection Qi, Fumin
2013
18 5 p. 418-426
article
7 A privacy protection method for continuous query based on location services Hu, Wenling
2013
18 5 p. 449-454
article
8 A quantum error-correction circuit based on cyclic code Lü, Hongjun
2013
18 5 p. 413-417
article
9 Formulations of some bit switching functions in DES You, Lin
2013
18 5 p. 402-406
article
10 G bytes data hiding method based on cluster chain structure Niu, Xiaopeng
2013
18 5 p. 443-448
article
11 Homomorphic MAC-based scheme against pollution attacks in network coding Zhang, Yujie
2013
18 5 p. 435-442
article
12 Information transfer model of virtual machine based on storage covert channel Wang, Xiaorui
2013
18 5 p. 377-384
article
13 Reversible audio watermarking algorithm using non-causal prediction Huo, Yongjin
2013
18 5 p. 455-460
article
                             13 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands