| Issue | Title | |
| Vol 24, No 6 (2023) | Privacy Protection Optimization for Federated Software Defect Prediction via Benchmark Analysis | Abstract |
| Ying Liu, Yong Li, Ming Wen, Wenjing Zhang | ||
| Vol 18, No 7 (2017) | Privacy Risk Assessment for SQLite Based Android Applications | Abstract |
| Kuo-Hui Yeh, Jia-Li Hou, Lin-Chih Chen, Hao-Xiang Liao, Wei-Pang Yang | ||
| Vol 20, No 7 (2019) | Privacy-Preserving Biometric-Based Remote User Authentication | Abstract PDF |
| Yangguang Tian, Yingjiu Li, Ximeng Liu, Robert H. Deng, Binanda Sengupta | ||
| Vol 16, No 3 (2015) | Privacy-Preserving Smart Similarity Search Based on Simhash over Encrypted Data in Cloud Computing | Abstract |
| Zhang-Jie Fu, Jian-Gang Shu, Jin Wang, Yu-Ling Liu, Sung-Young Lee | ||
| Vol 24, No 1 (2023) | Privacy-Protecting Attribute-Based Conjunctive Keyword Search Scheme in Cloud Storage | Abstract PDF |
| Yang Chen, Yang Liu, Jin Pan, Fei Gao, Emmanouil Panaousis | ||
| Vol 13, No 5 (2012) | Probabilistic Network Construction | Abstract |
| Chui-Hsing Chiu, Chih-Cheng Tseng, Tzu-Yu Chuang, Kuan-Hua Lin, Jhen-Kuan Li, Jyun-Hong Huang, Hai-Syu Syong, Kwang-Cheng Chen | ||
| Vol 15, No 4 (2014) | Probability Modeling and Functional Validation of Dynamic Service Composition for Location Based Services with Uncertain Factors | Abstract |
| Weimin Li, Zhengbo Ye, Xiaohua Zhao, Jiulei Jiang, Qun Jin | ||
| Vol 16, No 4 (2015) | Probing Distribution in Time and Space for IP Alias Resolution | Abstract |
| Santiago Garcia-Jimenez, Eduardo Magaña, Daniel Morató, Mikel Izal | ||
| Vol 23, No 6 (2022) | Probit Cryptographic Blockchain for Secure Data Transmission in Intelligent Transportation Systems | Abstract PDF |
| Rajesh Kumar Dhanaraj, Seifedine Kadry, Byeong-Gwon Kang, Yunyoung Nam | ||
| Vol 14, No 4 (2013) | Problem Based Learning Theory Oriented Portable Medical Training Platform | Abstract |
| Lun-Ping Hung, Kuo-Chung Chu, Der-Jiunn Deng | ||
| Vol 14, No 3 (2013) | Process Socio Space Discovery Based on Semantic Logs | Abstract |
| Rami Sellami, Walid Gaaloul, Bruno Defude | ||
| Vol 20, No 1 (2019) | Processing Directional Continuous Queries for Mobile Objects on Road Networks | Abstract PDF |
| Chow-Sing Lin, Ci-Ruei Jiang | ||
| Vol 13, No 1 (2012) | Producing Security Policy of IPSec Based on Improved λ-ID3 Algorithm | Abstract |
| Ming Yang, Shuxu Guo, Jun Wang | ||
| Vol 15, No 7 (2014) | Product Design Prediction Using Integrated Dynamic Kansei Engineering Scheme | Abstract |
| Kun-Chieh Wang | ||
| Vol 18, No 6 (2017) | Professional Social Networks: An Essential Tool for Professionals and Companies in the Global Economy | Abstract |
| José Luis Fernández-Alemán, Juan Manuel Carrillo de Gea, Ambrosio Toval, Joaquín Nicolás, Mario Piattini | ||
| Vol 18, No 3 (2017) | Prominent Causes of Poor Quality of Service in Network Communication | Abstract |
| Ijaz Ali Shoukat, Abdullah Al-Dhelaan, Mohsin Iftikhar, Mznah Al-Rodhaan | ||
| Vol 23, No 6 (2022) | Promoting Students’ Math Learning Performance and Engagement: A Help-seeking Mechanism-based Mobile Gaming Approach | Abstract PDF |
| Kai-Hsiang Yang, Hui-Chun Chu, Chin-Chung Hsieh, Fan-Ray Kuo | ||
| Vol 19, No 3 (2018) | Prompt Image Search with Deep Convolutional Neural Network via Efficient Hashing Code and Addictive Latent Semantic Layer | Abstract PDF |
| Jun-yi Li, Jian-hua Li | ||
| Vol 19, No 7 (2018) | Proposal and Assessment of Algorithms for Power Consumption Reduction in Wireless Networks with E-Ink Displays | Abstract PDF |
| Diego Sánchez-de-Rivera, Ramón Alcarria, Diego Martín, Gabriel Huecas | ||
| Vol 19, No 6 (2018) | Proposed Method for Mobile Forensics Investigation Analysis of Remnant Data on Google Drive Client | Abstract PDF |
| Gandeva Bayu Satrya, Soo Young Shin | ||
| Vol 23, No 3 (2022) | Protocol and Evaluation of Network Mobility with Producer Nodes in Named Data Networking | Abstract PDF |
| Lee Chee Hang, Yu-Beng Leau, Yong Jin Park, Zhiwei Yan, Supriyanto Praptodiyono | ||
| Vol 23, No 2 (2022) | Provably Secure Certificateless Proxy Signature Scheme in the Standard Model | Abstract PDF |
| Lunzhi Deng, Zhenyu Hu, Yu Ruan, Tao Wang | ||
| Vol 5, No 2 (2004) | Providing Internet Access and Efficient Mobility Support to IPv6 Personal Area Networks | Abstract |
| Nikolaos Alexiou, Georgios Tsiouris, Efstathios Sykas | ||
| Vol 13, No 4 (2012) | Providing Secure Location-Aware Services for Cooperative Vehicular Ad Hoc Networks | Abstract |
| Chul Sur, Youngho Park, Kouichi Sakurai, Kyung Hyune Rhee | ||
| Vol 5, No 3 (2004) | Proxy-Assisted Periodic Broadcast Architecture for Large-Scale Video Streaming | Abstract |
| Ewa Kusmierek, David H. C. Du, Yingfei Dong | ||
| 2076 - 2100 of 2755 Items | << < 79 80 81 82 83 84 85 86 87 88 > >> | |
