|
Issue |
Title |
|
Vol 18, No 2 (2017) |
A SaaS-Model-Based Approach to an Environment Monitoring System |
Abstract
|
Chin-Ling Chen, Jungpil Shin, Woei-Jiunn Tsaur, Changqing Gong, Liang Zhao |
|
Vol 18, No 4 (2017) |
A Sampling Methodology for DPI Classifiers |
Abstract
|
Jawad Khalife, Amjad Hajjar, Jesús Díaz-Verdejo |
|
Vol 12, No 2 (2011) |
A Scalable Internet-Based Walkthrough Environment with Panoramic Images |
Abstract
|
Angus M. K. Siu, Ada S. K. Wan, Rynson W. H. Lau |
|
Vol 10, No 5 (2009) |
A Scenario-Based BioAPI Conformance Test Technique to Apply a Telebiometric System Model to the National Infrastructure Establishment |
Abstract
|
Yong-Nyuo Shin, Woo-Chang Shin |
|
Vol 17, No 1 (2016) |
A SC-Vivaldi Network Coordinate System Based Method for IP Geolocation |
Abstract
|
Jing-Ning Chen, Fen-Lin Liu, Fan Zhao, Guang Zhu, Shi-Chang Ding |
|
Vol 16, No 1 (2015) |
A Secret Communication Method Based on Watermarking Technique Using Genetic Algorithm |
Abstract
|
Der-Chen Huang, Kun-Ding Hung, Ting-Wei Hou, Yung-Kuan Chan |
|
Vol 8, No 3 (2007) |
A Secure and Efficient Application Download Architecture in 3G Mobile Environment |
Abstract
|
Kuo-Zhe Chiou, Chin-Ta Lin, Jheng-Hong Tu, Hsi-Chung Lin, Sung-Ming Yen |
|
Vol 22, No 6 (2021) |
A Secure and Efficient Conditional Anonymous Scheme for Permissionless Blockchains |
Abstract
PDF
|
Ruiyang Li, Jun Shen, Shichong Tan, Kuan-Ching Li |
|
Vol 17, No 4 (2016) |
A Secure and Efficient IP Multimedia Subsystem Authentication Mechanism for LTE |
Abstract
|
Humaira Ashraf, Muhammad Sher, Ata Ullah Ghafoor, Muhammad Imran |
|
Vol 16, No 1 (2015) |
A Secure Authentication System for Controlling Traffic Lights for Ambulances |
Abstract
|
Yi-Li Huang, I-Long Lin, Fang-Yie Leu, Jung-Chun Liu, Fuu-Cheng Jiang, William Cheng-Chung Chu, Chao-Tung Yang |
|
Vol 21, No 2 (2020) |
A Secure Core-Assisted Multicast Routing Protocol in Mobile Ad-Hoc Network |
Abstract
PDF
|
Faheem Khan, Abdul Wahid Khan, Samiullah Khan, Iqbal Qasim, Asad Habib |
|
Vol 13, No 3 (2012) |
A Secure Dynamic Identity Based Remote User Authentication Scheme Using Secret Sharing |
Abstract
|
Yun Liu, Zi-Yao Cheng, Chin-Chen Chang, Zhen-Jiang Zhang |
|
Vol 18, No 4 (2017) |
A Secure Identity-Based Dynamic Group Data Sharing Scheme for Cloud Computing |
Abstract
|
Jian Shen, Dengzhi Liu, Chin-Feng Lai, Yongjun Ren, Xingming Sun |
|
Vol 19, No 1 (2018) |
A Secure Multi-keyword Ranked Search over Encrypted Cloud Data against Memory Leakage Attack |
Abstract
PDF
|
Lanxiang Chen, Linbing Qiu, Kuan-Ching Li, Shuming Zhou |
|
Vol 16, No 7 (2015) |
A Secure Public Transport Multimedia on Demand System for VANET |
Abstract
|
Chin-Ling Chen, Ming-Shaw Lu, Jian-Wei Li, Changqing Gong, Liang Zhao |
|
Vol 19, No 6 (2018) |
A Secure Service Agreement Underlying Cloud Computing Environment |
Abstract
PDF
|
Mao-Lun Chiang |
|
Vol 18, No 7 (2017) |
A Secure Spontaneous Mobile Ad Hoc Cloud Computing Network |
Abstract
|
Sandra Sendra, Raquel Lacuesta, Jaime Lloret, Elsa Macias-López |
|
Vol 19, No 1 (2018) |
A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things Environment |
Abstract
PDF
|
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng |
|
Vol 15, No 5 (2014) |
A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core |
Abstract
|
Ilsun You, Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Lih-Jiun Lo |
|
Vol 21, No 2 (2020) |
A Secured and Accessibility Controlled Sharing of Images with Multiple Users |
Abstract
PDF
|
S. Lakshmi Narayanan, K. Sankaranarayanan, V. Vijayakumari |
|
Vol 22, No 4 (2021) |
A Secured Data Storage Mechanism Using Baye’s Theorem and Matrix for Effective Data Communication in Cloud |
Abstract
PDF
|
Nithisha J, Jesu Jayarin P |
|
Vol 18, No 5 (2017) |
A Selection Mechanism for Multiple Error Concealment Techniques in Scalable Video Coding |
Abstract
|
Kuei-Chien Tsai, Gwo-Long Li, Mei-Juan Chen, Chih-Hsuan Yeh |
|
Vol 19, No 5 (2018) |
A Self-adaptive Artificial Bee Colony Algorithm with Symmetry Initialization |
Abstract
PDF
|
Yu Xue, Jiongming Jiang, Tinghuai Ma, Jingfa Liu, Wei Pang |
|
Vol 13, No 2 (2012) |
A Semantic-Based Development Method for Consumer Support Systems |
Abstract
|
Jen-Perng Yu, Jyh-Jong Lin |
|
Vol 11, No 2 (2010) |
A Semantics Based Approach for Cross Domain Access Control |
Abstract
|
Luo-Kai Hu, Shi Ying, Xiang-Yang Jia, Kai Zhao |
|
351 - 375 of 2657 Items |
<< < 10 11 12 13 14 15 16 17 18 19 > >> |