nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A secure and reliable routing protocol for wireless mesh networks
|
Hwang, Ren-junn |
|
2014 |
19 |
4 |
p. 466-475 |
artikel |
2 |
Attribute-based signature on lattices
|
Mao, Xian-ping |
|
2014 |
19 |
4 |
p. 406-411 |
artikel |
3 |
Audio authenticity: Duplicated audio segment detection in waveform audio file
|
Xiao, Ji-nian |
|
2014 |
19 |
4 |
p. 392-397 |
artikel |
4 |
Comparison on hydraulic characteristics between orifice plate and plug
|
Ai, Wan-zheng |
|
2014 |
19 |
4 |
p. 476-480 |
artikel |
5 |
Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing
|
Wang, Liang-liang |
|
2014 |
19 |
4 |
p. 398-405 |
artikel |
6 |
Engineering projects real-time supervision mechanism based on grid management
|
Wu, Yun-na |
|
2014 |
19 |
4 |
p. 502-507 |
artikel |
7 |
Intrusion detection model with twin support vector machines
|
He, Jun |
|
2014 |
19 |
4 |
p. 448-454 |
artikel |
8 |
Keyword search encryption scheme resistant against keyword-guessing attack by the untrusted server
|
Wang, Chih-hung |
|
2014 |
19 |
4 |
p. 440-442 |
artikel |
9 |
New constructions of dynamic threshold cryptosystem
|
Long, Yu |
|
2014 |
19 |
4 |
p. 431-435 |
artikel |
10 |
Numerical study on vortex induced vibration of a flexible plate behind square cylinder with various flow velocities
|
Hu, Shi-liang |
|
2014 |
19 |
4 |
p. 488-494 |
artikel |
11 |
One construction of chameleon all-but-one trapdoor functions
|
Xu, Yi-dong |
|
2014 |
19 |
4 |
p. 412-417 |
artikel |
12 |
Particle swarm approach for structural optimization of battleship strength deck under air blast
|
Yu, Hai-yang |
|
2014 |
19 |
4 |
p. 481-487 |
artikel |
13 |
Provably secure authenticated Diffie-Hellman key exchange for resource-limited smart card
|
Chien, Hung-yu |
|
2014 |
19 |
4 |
p. 436-439 |
artikel |
14 |
Region of interest based selective encryption scheme for privacy protection in H.264 video
|
Guo, Jie |
|
2014 |
19 |
4 |
p. 385-391 |
artikel |
15 |
Research on classification of malware source code
|
Chia-mei, Chen |
|
2014 |
19 |
4 |
p. 425-430 |
artikel |
16 |
Robust password and smart card based authentication scheme with smart card revocation
|
Xie, Qi |
|
2014 |
19 |
4 |
p. 418-424 |
artikel |
17 |
Secure and efficient digital rights management mechanisms with privacy protection
|
Huang, Jheng-jia |
|
2014 |
19 |
4 |
p. 443-447 |
artikel |
18 |
Serum renalase inversely related to heart rate variability in dialysis patients
|
Huang, Bao-rui |
|
2014 |
19 |
4 |
p. 508-512 |
artikel |
19 |
Two-phase flow pressure drop of liquid nitrogen boiling in the straight section downstream of U-bend
|
Deng, Dong |
|
2014 |
19 |
4 |
p. 495-501 |
artikel |
20 |
Visual multi-secret sharing with friendliness
|
Jeng, Fuh-gwo |
|
2014 |
19 |
4 |
p. 455-465 |
artikel |