nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing
|
Kiraz, Mehmet Sabır |
|
2016 |
7 |
5 |
p. 731-760 |
artikel |
2 |
A novel dynamic scheduling strategy for solving flexible job-shop problems
|
Ning, Tao |
|
2016 |
7 |
5 |
p. 721-729 |
artikel |
3 |
A secure group-based mobile chat protocol
|
Chen, Hsing-Chung |
|
2016 |
7 |
5 |
p. 693-703 |
artikel |
4 |
Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge
|
Desnitsky, Vasily |
|
2016 |
7 |
5 |
p. 705-719 |
artikel |
5 |
Dynamic proofs of retrievability with square-root oblivious RAM
|
Xu, Jian |
|
2015 |
7 |
5 |
p. 611-621 |
artikel |
6 |
Multi-segment and multi-stage projected tetrahedra
|
Li, Xin |
|
2015 |
7 |
5 |
p. 639-648 |
artikel |
7 |
Particle swarm optimization algorithm based on ontology model to support cloud computing applications
|
Zhang, Chijun |
|
2015 |
7 |
5 |
p. 633-638 |
artikel |
8 |
Performance analysis of object recognition and tracking for the use of surveillance system
|
Ahn, Hyochang |
|
2015 |
7 |
5 |
p. 673-679 |
artikel |
9 |
Pseudonymous authentication for secure V2I services in cloud-based vehicular networks
|
Park, Yougho |
|
2015 |
7 |
5 |
p. 661-671 |
artikel |
10 |
Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs
|
Hu, Chengyu |
|
2015 |
7 |
5 |
p. 681-692 |
artikel |
11 |
Security framework for RESTful mobile cloud computing Web services
|
AlShahwan, Feda |
|
2015 |
7 |
5 |
p. 649-659 |
artikel |
12 |
Special issue on security and privacy techniques in mobile cloud computing
|
You, Ilsun |
|
2016 |
7 |
5 |
p. 607-609 |
artikel |
13 |
Unidirectional IBPRE scheme from lattice for cloud computation
|
Zhang, Minqing |
|
2015 |
7 |
5 |
p. 623-631 |
artikel |