| Issue | Title | |
| Vol 12, No 2 (2011) | A Resource-Aware Task Scheduling Algorithm on Mobile Computational Grid | Abstract |
| Yue-Shan Chang, Hung-Hsiang Chang, Ruey-Kai Sheu, Ching-Tsorng Tsai | ||
| Vol 24, No 3 (2023) | A Retrieval Algorithm for Time-constrained Heterogeneous Data Items in Wireless Networks | Abstract PDF |
| Yangming Zhang, Ping He, Huaying Qi, Shiyi Wang | ||
| Vol 17, No 7 (2016) | A Review of Recent Developments about Secure Data Aggregation in Wireless Sensor Networks | Abstract |
| Kequn Hou, Baofeng Wang, Zumin Wang, Chunsheng Zhu | ||
| Vol 18, No 5 (2017) | A RFID Based Localization Algorithm Applying Trilateration for Wireless Sensor Networks | Abstract |
| Jian Shen, Anxi Wang, Chen Wang, Neal N. Xiong | ||
| Vol 18, No 4 (2017) | A Road-Network Based Privacy-Preserving Approach in Trajectory Publishing | Abstract |
| Ayong Ye, Yongxing Zheng, Li Xu, Yuexin Zhang | ||
| Vol 15, No 2 (2014) | A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions | Abstract |
| Yu-Hao Chuang, Chien-Lung Hsu | ||
| Vol 19, No 6 (2018) | A Robust GA/PSO-Hybrid Algorithm in Intelligent Shipping Route Planning Systems for Maritime Traffic Networks | Abstract PDF |
| Zhao Liu, Jingxian Liu, Feng Zhou, Ryan Wen Liu, Naixue Xiong | ||
| Vol 19, No 2 (2018) | A Robust Image Steganography Method Resistant to Scaling and Detection | Abstract PDF |
| Yue Zhang, Xiangyang Luo, Jinwei Wang, Chunfang Yang, Fenlin Liu | ||
| Vol 12, No 2 (2011) | A Robust P2P Media Streaming Scheme in Dynamic Environments | Abstract |
| Shih-Wei Chang, Sheng-De Wang | ||
| Vol 18, No 2 (2017) | A SaaS-Model-Based Approach to an Environment Monitoring System | Abstract |
| Chin-Ling Chen, Jungpil Shin, Woei-Jiunn Tsaur, Changqing Gong, Liang Zhao | ||
| Vol 18, No 4 (2017) | A Sampling Methodology for DPI Classifiers | Abstract |
| Jawad Khalife, Amjad Hajjar, Jesús Díaz-Verdejo | ||
| Vol 12, No 2 (2011) | A Scalable Internet-Based Walkthrough Environment with Panoramic Images | Abstract |
| Angus M. K. Siu, Ada S. K. Wan, Rynson W. H. Lau | ||
| Vol 10, No 5 (2009) | A Scenario-Based BioAPI Conformance Test Technique to Apply a Telebiometric System Model to the National Infrastructure Establishment | Abstract |
| Yong-Nyuo Shin, Woo-Chang Shin | ||
| Vol 17, No 1 (2016) | A SC-Vivaldi Network Coordinate System Based Method for IP Geolocation | Abstract |
| Jing-Ning Chen, Fen-Lin Liu, Fan Zhao, Guang Zhu, Shi-Chang Ding | ||
| Vol 16, No 1 (2015) | A Secret Communication Method Based on Watermarking Technique Using Genetic Algorithm | Abstract |
| Der-Chen Huang, Kun-Ding Hung, Ting-Wei Hou, Yung-Kuan Chan | ||
| Vol 8, No 3 (2007) | A Secure and Efficient Application Download Architecture in 3G Mobile Environment | Abstract |
| Kuo-Zhe Chiou, Chin-Ta Lin, Jheng-Hong Tu, Hsi-Chung Lin, Sung-Ming Yen | ||
| Vol 22, No 6 (2021) | A Secure and Efficient Conditional Anonymous Scheme for Permissionless Blockchains | Abstract PDF |
| Ruiyang Li, Jun Shen, Shichong Tan, Kuan-Ching Li | ||
| Vol 17, No 4 (2016) | A Secure and Efficient IP Multimedia Subsystem Authentication Mechanism for LTE | Abstract |
| Humaira Ashraf, Muhammad Sher, Ata Ullah Ghafoor, Muhammad Imran | ||
| Vol 16, No 1 (2015) | A Secure Authentication System for Controlling Traffic Lights for Ambulances | Abstract |
| Yi-Li Huang, I-Long Lin, Fang-Yie Leu, Jung-Chun Liu, Fuu-Cheng Jiang, William Cheng-Chung Chu, Chao-Tung Yang | ||
| Vol 21, No 2 (2020) | A Secure Core-Assisted Multicast Routing Protocol in Mobile Ad-Hoc Network | Abstract PDF |
| Faheem Khan, Abdul Wahid Khan, Samiullah Khan, Iqbal Qasim, Asad Habib | ||
| Vol 13, No 3 (2012) | A Secure Dynamic Identity Based Remote User Authentication Scheme Using Secret Sharing | Abstract |
| Yun Liu, Zi-Yao Cheng, Chin-Chen Chang, Zhen-Jiang Zhang | ||
| Vol 18, No 4 (2017) | A Secure Identity-Based Dynamic Group Data Sharing Scheme for Cloud Computing | Abstract |
| Jian Shen, Dengzhi Liu, Chin-Feng Lai, Yongjun Ren, Xingming Sun | ||
| Vol 19, No 1 (2018) | A Secure Multi-keyword Ranked Search over Encrypted Cloud Data against Memory Leakage Attack | Abstract PDF |
| Lanxiang Chen, Linbing Qiu, Kuan-Ching Li, Shuming Zhou | ||
| Vol 16, No 7 (2015) | A Secure Public Transport Multimedia on Demand System for VANET | Abstract |
| Chin-Ling Chen, Ming-Shaw Lu, Jian-Wei Li, Changqing Gong, Liang Zhao | ||
| Vol 19, No 6 (2018) | A Secure Service Agreement Underlying Cloud Computing Environment | Abstract PDF |
| Mao-Lun Chiang | ||
| 351 - 375 of 2720 Items | << < 10 11 12 13 14 15 16 17 18 19 > >> | |
