Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             20 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A more efficient accountable authority IBE scheme under the DL assumption Xu, Peng
2010
53 3 p. 581-592
artikel
2 A property-based attestation protocol for TCM Feng, DengGuo
2010
53 3 p. 454-464
artikel
3 Asymmetric encryption and signature method with DNA technology Lai, XueJia
2010
53 3 p. 506-514
artikel
4 Bayesian cognitive trust model based self-clustering algorithm for MANETs Wang, Wei
2010
53 3 p. 494-505
artikel
5 CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles Weng, Jian
2010
53 3 p. 593-606
artikel
6 Centroid-based semi-fragile audio watermarking in hybrid domain Wang, HongXia
2010
53 3 p. 619-633
artikel
7 Conjugate adjoining problem in braid groups and new design of braid-based signatures Wang, LiCheng
2010
53 3 p. 524-536
artikel
8 Constructing quantum error correcting code via logic function Zhong, ShuQin
2010
53 3 p. 515-523
artikel
9 Differential-algebraic cryptanalysis of reduced-round of Serpent-256 Wang, MeiQin
2010
53 3 p. 546-556
artikel
10 Efficient signcryption between TPKC and IDPKC and its multi-receiver construction Sun, YinXia
2010
53 3 p. 557-566
artikel
11 Embedded DHT overlays in virtual computing environments Zhang, YiMing
2010
53 3 p. 483-493
artikel
12 Identifying heavy hitters in high-speed network monitoring Zhang, Yu
2010
53 3 p. 659-676
artikel
13 Image universal steganalysis based on best wavelet packet decomposition Luo, XiangYang
2010
53 3 p. 634-647
artikel
14 On the number of rotation symmetric Boolean functions Fu, ShaoJing
2010
53 3 p. 537-545
artikel
15 Research on theory and key technology of trusted computing platform security testing and evaluation Zhang, HuanGuo
2010
53 3 p. 434-453
artikel
16 Research on trusted computing and its development Shen, ChangXiang
2010
53 3 p. 405-433
artikel
17 Robust AVS audio watermarking Wang, Yong
2010
53 3 p. 607-618
artikel
18 Secure network coding in the presence of eavesdroppers Luo, MingXing
2010
53 3 p. 648-658
artikel
19 Universally composable one-time signature and broadcast authentication Zhang, JunWei
2010
53 3 p. 567-580
artikel
20 Universally composable secure TNC model and EAP-TNC protocol in IF-T Zhang, JunWei
2010
53 3 p. 465-482
artikel
                             20 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland