Browse Title Index


 
Issue Title
 
Vol 18, No 2 (2017) A SaaS-Model-Based Approach to an Environment Monitoring System Abstract
Chin-Ling Chen, Jungpil Shin, Woei-Jiunn Tsaur, Changqing Gong, Liang Zhao
 
Vol 18, No 4 (2017) A Sampling Methodology for DPI Classifiers Abstract
Jawad Khalife, Amjad Hajjar, Jesús Díaz-Verdejo
 
Vol 12, No 2 (2011) A Scalable Internet-Based Walkthrough Environment with Panoramic Images Abstract
Angus M. K. Siu, Ada S. K. Wan, Rynson W. H. Lau
 
Vol 10, No 5 (2009) A Scenario-Based BioAPI Conformance Test Technique to Apply a Telebiometric System Model to the National Infrastructure Establishment Abstract
Yong-Nyuo Shin, Woo-Chang Shin
 
Vol 17, No 1 (2016) A SC-Vivaldi Network Coordinate System Based Method for IP Geolocation Abstract
Jing-Ning Chen, Fen-Lin Liu, Fan Zhao, Guang Zhu, Shi-Chang Ding
 
Vol 16, No 1 (2015) A Secret Communication Method Based on Watermarking Technique Using Genetic Algorithm Abstract
Der-Chen Huang, Kun-Ding Hung, Ting-Wei Hou, Yung-Kuan Chan
 
Vol 8, No 3 (2007) A Secure and Efficient Application Download Architecture in 3G Mobile Environment Abstract
Kuo-Zhe Chiou, Chin-Ta Lin, Jheng-Hong Tu, Hsi-Chung Lin, Sung-Ming Yen
 
Vol 22, No 6 (2021) A Secure and Efficient Conditional Anonymous Scheme for Permissionless Blockchains Abstract   PDF
Ruiyang Li, Jun Shen, Shichong Tan, Kuan-Ching Li
 
Vol 17, No 4 (2016) A Secure and Efficient IP Multimedia Subsystem Authentication Mechanism for LTE Abstract
Humaira Ashraf, Muhammad Sher, Ata Ullah Ghafoor, Muhammad Imran
 
Vol 16, No 1 (2015) A Secure Authentication System for Controlling Traffic Lights for Ambulances Abstract
Yi-Li Huang, I-Long Lin, Fang-Yie Leu, Jung-Chun Liu, Fuu-Cheng Jiang, William Cheng-Chung Chu, Chao-Tung Yang
 
Vol 21, No 2 (2020) A Secure Core-Assisted Multicast Routing Protocol in Mobile Ad-Hoc Network Abstract   PDF
Faheem Khan, Abdul Wahid Khan, Samiullah Khan, Iqbal Qasim, Asad Habib
 
Vol 13, No 3 (2012) A Secure Dynamic Identity Based Remote User Authentication Scheme Using Secret Sharing Abstract
Yun Liu, Zi-Yao Cheng, Chin-Chen Chang, Zhen-Jiang Zhang
 
Vol 18, No 4 (2017) A Secure Identity-Based Dynamic Group Data Sharing Scheme for Cloud Computing Abstract
Jian Shen, Dengzhi Liu, Chin-Feng Lai, Yongjun Ren, Xingming Sun
 
Vol 19, No 1 (2018) A Secure Multi-keyword Ranked Search over Encrypted Cloud Data against Memory Leakage Attack Abstract   PDF
Lanxiang Chen, Linbing Qiu, Kuan-Ching Li, Shuming Zhou
 
Vol 16, No 7 (2015) A Secure Public Transport Multimedia on Demand System for VANET Abstract
Chin-Ling Chen, Ming-Shaw Lu, Jian-Wei Li, Changqing Gong, Liang Zhao
 
Vol 19, No 6 (2018) A Secure Service Agreement Underlying Cloud Computing Environment Abstract   PDF
Mao-Lun Chiang
 
Vol 18, No 7 (2017) A Secure Spontaneous Mobile Ad Hoc Cloud Computing Network Abstract
Sandra Sendra, Raquel Lacuesta, Jaime Lloret, Elsa Macias-López
 
Vol 19, No 1 (2018) A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things Environment Abstract   PDF
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng
 
Vol 15, No 5 (2014) A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core Abstract
Ilsun You, Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Lih-Jiun Lo
 
Vol 21, No 2 (2020) A Secured and Accessibility Controlled Sharing of Images with Multiple Users Abstract   PDF
S. Lakshmi Narayanan, K. Sankaranarayanan, V. Vijayakumari
 
Vol 22, No 4 (2021) A Secured Data Storage Mechanism Using Baye’s Theorem and Matrix for Effective Data Communication in Cloud Abstract   PDF
Nithisha J, Jesu Jayarin P
 
Vol 18, No 5 (2017) A Selection Mechanism for Multiple Error Concealment Techniques in Scalable Video Coding Abstract
Kuei-Chien Tsai, Gwo-Long Li, Mei-Juan Chen, Chih-Hsuan Yeh
 
Vol 19, No 5 (2018) A Self-adaptive Artificial Bee Colony Algorithm with Symmetry Initialization Abstract   PDF
Yu Xue, Jiongming Jiang, Tinghuai Ma, Jingfa Liu, Wei Pang
 
Vol 13, No 2 (2012) A Semantic-Based Development Method for Consumer Support Systems Abstract
Jen-Perng Yu, Jyh-Jong Lin
 
Vol 11, No 2 (2010) A Semantics Based Approach for Cross Domain Access Control Abstract
Luo-Kai Hu, Shi Ying, Xiang-Yang Jia, Kai Zhao
 
351 - 375 of 2657 Items << < 10 11 12 13 14 15 16 17 18 19 > >>