Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2694)
Editorial
(409)
by Journal
by Funding Agency
Clear filters
Powered by
20 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: E.4 - CODING AND INFORMATION THEORY
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Privacy and security challenges of the digital twin: systematic literature review
Marija Kuštelega
,
Renata Mekovec
,
Ahmed Shareef
10.3897/jucs.114607
28-12-2024
Unique: 428 | Total: 552
| Access Period:
1782-1806
HTML
PDF
Research Article
Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage
Lasse Nitz
,
Avikarsha Mandal
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134762
14-09-2024
Unique: 487 | Total: 645
| Access Period:
1224-1243
HTML
PDF
Research Article
E - Capacity - Equivocation Region of Wiretap Channel
Mariam Haroutunian
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence I
10.3897/jucs.76605
28-11-2021
Unique: 1242 | Total: 2164
| Access Period:
1222-1239
HTML
XML
PDF
Research Article
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay
Hui Tian
,
Meilun Huang
,
Chin-Chen Chang
,
Yongfeng Huang
,
Jing Lu
,
Yongqian Du
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1131
28-09-2019
Unique: 1068 | Total: 1690
| Access Period:
1131-1150
HTML
XML
PDF
Research Article
Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation
Yanling Chen
,
O. Koyluoglu
,
A. J. Han Vinck
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0904
28-08-2019
Unique: 920 | Total: 1545
| Access Period:
904-924
HTML
XML
PDF
Research Article
A New Information-Theoretical Distance Measure for Evaluating Community Detection Algorithms
Mariam Haroutunian
,
Karen Mkhitaryan
,
Josiane Mothe
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0887
28-08-2019
Unique: 953 | Total: 1544
| Access Period:
887-903
HTML
XML
PDF
Research Article
Parallel Fast Sort Algorithm for Secure Multiparty Computation
Zbigniew Marszałek
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0488
28-04-2018
Unique: 784 | Total: 1067
| Access Period:
488-514
HTML
XML
PDF
Research Article
Secure Method for Combining Cryptography with Iris Biometrics
Alawi Al-Saggaf
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0341
28-04-2018
Unique: 729 | Total: 1007
| Access Period:
341-356
HTML
XML
PDF
Research Article
A Note on Variable-Length Codes with Constant Hamming Weights
Peter Fenwick
10.3217/jucs-021-09-1136
01-09-2015
Unique: 620 | Total: 852
| Access Period:
1136-1142
HTML
XML
PDF
Research Article
A Security Real-time Privacy Amplification Scheme in QKD System
Bo Liu
,
Baokang Zhao
,
Bo Liu
,
Chunqing Wu
Part of: Information Security
10.3217/jucs-019-16-2420
01-10-2013
Unique: 763 | Total: 1011
| Access Period:
2420-2436
HTML
XML
PDF
Research Article
Low Complexity H.264/AVC Intraframe Coding for Wireless Multimedia Sensor Network
Xingang Liu
,
Jiantan Liu
,
Kook-Yeol Yoo
,
Haengrae Cho
Part of: Internet of Things
10.3217/jucs-018-09-1177
01-05-2012
Unique: 786 | Total: 1047
| Access Period:
1177-1193
HTML
XML
PDF
Research Article
Information Theoretically Secure Encryption with Almost Free Authentication
Basel Alomair
,
Radha Poovendran
10.3217/jucs-015-15-2937
01-09-2009
Unique: 589 | Total: 775
| Access Period:
2937-2956
HTML
XML
PDF
1
2
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK