|
Issue |
Title |
|
Vol 18, No 5 (2017) |
A RFID Based Localization Algorithm Applying Trilateration for Wireless Sensor Networks |
Abstract
|
Jian Shen, Anxi Wang, Chen Wang, Neal N. Xiong |
|
Vol 18, No 4 (2017) |
A Road-Network Based Privacy-Preserving Approach in Trajectory Publishing |
Abstract
|
Ayong Ye, Yongxing Zheng, Li Xu, Yuexin Zhang |
|
Vol 15, No 2 (2014) |
A Robust Dynamic Access Control Scheme in a User Hierarchy Based on One-Way Hash Functions |
Abstract
|
Yu-Hao Chuang, Chien-Lung Hsu |
|
Vol 19, No 6 (2018) |
A Robust GA/PSO-Hybrid Algorithm in Intelligent Shipping Route Planning Systems for Maritime Traffic Networks |
Abstract
PDF
|
Zhao Liu, Jingxian Liu, Feng Zhou, Ryan Wen Liu, Naixue Xiong |
|
Vol 19, No 2 (2018) |
A Robust Image Steganography Method Resistant to Scaling and Detection |
Abstract
PDF
|
Yue Zhang, Xiangyang Luo, Jinwei Wang, Chunfang Yang, Fenlin Liu |
|
Vol 12, No 2 (2011) |
A Robust P2P Media Streaming Scheme in Dynamic Environments |
Abstract
|
Shih-Wei Chang, Sheng-De Wang |
|
Vol 18, No 2 (2017) |
A SaaS-Model-Based Approach to an Environment Monitoring System |
Abstract
|
Chin-Ling Chen, Jungpil Shin, Woei-Jiunn Tsaur, Changqing Gong, Liang Zhao |
|
Vol 18, No 4 (2017) |
A Sampling Methodology for DPI Classifiers |
Abstract
|
Jawad Khalife, Amjad Hajjar, Jesús Díaz-Verdejo |
|
Vol 12, No 2 (2011) |
A Scalable Internet-Based Walkthrough Environment with Panoramic Images |
Abstract
|
Angus M. K. Siu, Ada S. K. Wan, Rynson W. H. Lau |
|
Vol 10, No 5 (2009) |
A Scenario-Based BioAPI Conformance Test Technique to Apply a Telebiometric System Model to the National Infrastructure Establishment |
Abstract
|
Yong-Nyuo Shin, Woo-Chang Shin |
|
Vol 17, No 1 (2016) |
A SC-Vivaldi Network Coordinate System Based Method for IP Geolocation |
Abstract
|
Jing-Ning Chen, Fen-Lin Liu, Fan Zhao, Guang Zhu, Shi-Chang Ding |
|
Vol 16, No 1 (2015) |
A Secret Communication Method Based on Watermarking Technique Using Genetic Algorithm |
Abstract
|
Der-Chen Huang, Kun-Ding Hung, Ting-Wei Hou, Yung-Kuan Chan |
|
Vol 8, No 3 (2007) |
A Secure and Efficient Application Download Architecture in 3G Mobile Environment |
Abstract
|
Kuo-Zhe Chiou, Chin-Ta Lin, Jheng-Hong Tu, Hsi-Chung Lin, Sung-Ming Yen |
|
Vol 22, No 6 (2021) |
A Secure and Efficient Conditional Anonymous Scheme for Permissionless Blockchains |
Abstract
PDF
|
Ruiyang Li, Jun Shen, Shichong Tan, Kuan-Ching Li |
|
Vol 17, No 4 (2016) |
A Secure and Efficient IP Multimedia Subsystem Authentication Mechanism for LTE |
Abstract
|
Humaira Ashraf, Muhammad Sher, Ata Ullah Ghafoor, Muhammad Imran |
|
Vol 16, No 1 (2015) |
A Secure Authentication System for Controlling Traffic Lights for Ambulances |
Abstract
|
Yi-Li Huang, I-Long Lin, Fang-Yie Leu, Jung-Chun Liu, Fuu-Cheng Jiang, William Cheng-Chung Chu, Chao-Tung Yang |
|
Vol 21, No 2 (2020) |
A Secure Core-Assisted Multicast Routing Protocol in Mobile Ad-Hoc Network |
Abstract
PDF
|
Faheem Khan, Abdul Wahid Khan, Samiullah Khan, Iqbal Qasim, Asad Habib |
|
Vol 13, No 3 (2012) |
A Secure Dynamic Identity Based Remote User Authentication Scheme Using Secret Sharing |
Abstract
|
Yun Liu, Zi-Yao Cheng, Chin-Chen Chang, Zhen-Jiang Zhang |
|
Vol 18, No 4 (2017) |
A Secure Identity-Based Dynamic Group Data Sharing Scheme for Cloud Computing |
Abstract
|
Jian Shen, Dengzhi Liu, Chin-Feng Lai, Yongjun Ren, Xingming Sun |
|
Vol 19, No 1 (2018) |
A Secure Multi-keyword Ranked Search over Encrypted Cloud Data against Memory Leakage Attack |
Abstract
PDF
|
Lanxiang Chen, Linbing Qiu, Kuan-Ching Li, Shuming Zhou |
|
Vol 16, No 7 (2015) |
A Secure Public Transport Multimedia on Demand System for VANET |
Abstract
|
Chin-Ling Chen, Ming-Shaw Lu, Jian-Wei Li, Changqing Gong, Liang Zhao |
|
Vol 19, No 6 (2018) |
A Secure Service Agreement Underlying Cloud Computing Environment |
Abstract
PDF
|
Mao-Lun Chiang |
|
Vol 18, No 7 (2017) |
A Secure Spontaneous Mobile Ad Hoc Cloud Computing Network |
Abstract
|
Sandra Sendra, Raquel Lacuesta, Jaime Lloret, Elsa Macias-López |
|
Vol 19, No 1 (2018) |
A Secure Three Party Node Authentication and Key Establishment Scheme for the Internet of Things Environment |
Abstract
PDF
|
Chun-Ta Li, Cheng-Chi Lee, Chi-Yao Weng |
|
Vol 15, No 5 (2014) |
A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core |
Abstract
|
Ilsun You, Yi-Li Huang, Fang-Yie Leu, Jung-Chun Liu, Lih-Jiun Lo |
|
351 - 375 of 2683 Items |
<< < 10 11 12 13 14 15 16 17 18 19 > >> |