Browse Title Index


 
Issue Title
 
Vol 11, No 3 (2010) Security Challenges for User-Oriented RFID Applications within the "Internet of Things" Abstract
G. P. Hancke, K. Markantonakis, K. E. Mayes
 
Vol 17, No 5 (2016) Security Challenges in Recent Internet Threats and Enhanced Security Service Model for Future IT Environments Abstract
Man-Sik Kim, Jeong-Kyu Lee, Jong Hyuk Park, Jung-Ho Kang
 
Vol 18, No 3 (2017) Security Collaborative Optimization Strategy for Perception Layer in Cognitive IoT Abstract
Ruijuan Zheng, Mingchuan Zhang, Qinghua Zheng, Qingtao Wu, Wangyang Wei
 
Vol 14, No 3 (2013) Security Evaluation of Double-Block-Length Hash Modes with Preimage Attacks on PGV Schemes Abstract
Duk-Jae Moon, Deuk-Jo Hong, Bon-Wook Koo, Seok-Hie Hong
 
Vol 7, No 3 (2006) Security Frame and Evaluation in Mobile Agent System Abstract
Su-Zhen Wang, Jia-Zhen Wang
 
Vol 8, No 1 (2007) Security Protocols for Wireless Local Area Networks (WLANs) and Cellular Networks Abstract
Sherali Zeadally, Farhan Siddiqui
 
Vol 10, No 1 (2009) Security Simulation Modeling Using Contract Net Protocol Abstract
Jong-Hyuk Park, Hee-Suk Seo
 
Vol 24, No 5 (2023) Security Threat Early Warning of Distance Education System Based on Blockchain Abstract
Zhihua Chen, Gautam Srivastava
 
Vol 23, No 6 (2022) Segmentation-based Decision Networks for Steel Surface Defect Detection Abstract   PDF
Zhongqin Bi, Qiancong Wu, Meijing Shan, Wei Zhong
 
Vol 24, No 4 (2023) Selective Layered Blockchain Framework for Privacy-preserving Data Management in Low-latency Mobile Networks Abstract
Sun-Woo Yun, Eun-Young Lee, Il-Gu Lee
 
Vol 17, No 4 (2016) Self-Adaptive Chaotic Logistic Map: An Efficient Image Encryption Method Abstract
Hai Cheng, Yu Song, Chunguang Huang, Qun Ding
 
Vol 11, No 7 (2010) Self-Certified Multi-authenticated Encryption Scheme Abstract
Jia-Lun Tsai, Tzong-Chen Wu, Kuo-Yu Tsai
 
Vol 22, No 3 (2021) Self-efficacy in Home-based Online Learning Environments Abstract   PDF
He-Hai Liu, Yi-Chen Ye, Hui-Ling Jiang
 
Vol 19, No 2 (2018) Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications Abstract   PDF
Vishal Sharma, Gaurav Choudhary, Ilsun You, Jae Deok Lim, Jeong Nyeo Kim
 
Vol 10, No 5 (2009) Self-Recovery Algorithm Based on Motion Estimation of I-Frames for Compressed Video Abstract
Xiao Zeng, Zhen-Yong Chen, Zhang Xiong
 
Vol 12, No 3 (2011) Self-Similar Traffic Prediction Algorithm Based on an Improved Kalman Filtering Abstract
Zhen-Yu Na, Zi-He Gao
 
Vol 14, No 3 (2013) Semantic Link Networks: Theory, Applications, and Future Trends Abstract
Yun-Chuan Sun, Rong-Fang Bie, Xiao-Feng Yu, Shen-Ling Wang
 
Vol 13, No 4 (2012) Semantic Representation of Motion for Tracing Object in Surveillance System Abstract
Chang Choi, Junho Choi, Juhyun Shin, Sung-Ryul Kim, Pankoo Kim
 
Vol 8, No 4 (2007) Semantic Retrieval of Electronic Medical Records Based on Concept Networks Abstract
Tzung-Pei Hong, Jung-Chih Wang, Jiann-Horng Lin
 
Vol 5, No 4 (2004) Semantic Transcoding of Videos by Using Adaptive Quantization Abstract
Rita Cucchiara, Costantino Grana, Andrea Prati
 
Vol 8, No 4 (2007) Semantic Web Search for e-Government: The Case Study of Intrastat Abstract
Konstantinos Markellos, Evangelos Sakkopoulos, Spiros Sirmakessis, Athanasios Tsakalidis
 
Vol 12, No 2 (2011) Semi-blind Watermarking Scheme Exploiting Self-Reference Image Abstract
Chin-Feng Lee, Hsing-Ling Chen, Tsung-Chia Yang
 
Vol 11, No 7 (2010) SeMIPv6: Secure and Efficient Roaming Mechanism Based on IEEE 802.11r and MIH Abstract
Tin-Yu Wu, Wei Chen, Wei-Tsong Lee, Fong-Hao Liu, Yong-Ping Huang
 
Vol 26, No 4 (2025) Sentiment Analysis of Scenic Users’ Comment Using FastText and LSTM Model Abstract
Lei Shang, Yijia Wang, Xinqi Dong, Peiyao Niu, Shan Ji
 
Vol 23, No 7 (2022) Sentiment Analysis of Social Media Content in Pashto Language using Deep Learning Algorithms Abstract   PDF
Saqib Iqbal, Farhad Khan, Hikmat Ullah Khan, Tassawar Iqbal, Jamal Hussain Shah
 
2226 - 2250 of 2695 Items << < 85 86 87 88 89 90 91 92 93 94 > >>