Register
|
Login
Full Text
Author
Title
Submit manuscript
About
News
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2712)
Editorial
(413)
by Journal
by Funding Agency
Clear filters
Powered by
20 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: E.4 - CODING AND INFORMATION THEORY
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Privacy and security challenges of the digital twin: systematic literature review
Marija Kuštelega
,
Renata Mekovec
,
Ahmed Shareef
10.3897/jucs.114607
28-12-2024
Unique: 967 | Total: 1406
| Access Period:
1782-1806
HTML
PDF
Research Article
Bloom Encodings in DGA Detection: Improving Machine Learning Privacy by Building on Privacy-Preserving Record Linkage
Lasse Nitz
,
Avikarsha Mandal
Part of: Fighting Cybersecurity Risks from a Multidisciplinary Perspective
10.3897/jucs.134762
14-09-2024
Unique: 588 | Total: 781
| Access Period:
1224-1243
HTML
PDF
Research Article
E - Capacity - Equivocation Region of Wiretap Channel
Mariam Haroutunian
Part of: Challenges for Smart Environments - Human-Centered Computing, Data Science, and Ambient Intelligence I
10.3897/jucs.76605
28-11-2021
Unique: 1332 | Total: 2320
| Access Period:
1222-1239
HTML
XML
PDF
Research Article
Steganalysis of Adaptive Multi-Rate Speech Using Statistical Characteristics of Pitch Delay
Hui Tian
,
Meilun Huang
,
Chin-Chen Chang
,
Yongfeng Huang
,
Jing Lu
,
Yongqian Du
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1131
28-09-2019
Unique: 1162 | Total: 1837
| Access Period:
1131-1150
HTML
XML
PDF
Research Article
Secrecy over Multiple-Access Channel: A Game of Competition and Cooperation
Yanling Chen
,
O. Koyluoglu
,
A. J. Han Vinck
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0904
28-08-2019
Unique: 1008 | Total: 1685
| Access Period:
904-924
HTML
XML
PDF
Research Article
A New Information-Theoretical Distance Measure for Evaluating Community Detection Algorithms
Mariam Haroutunian
,
Karen Mkhitaryan
,
Josiane Mothe
Part of: Collaborative Technologies and Data Science in Smart City Applications
10.3217/jucs-025-08-0887
28-08-2019
Unique: 1026 | Total: 1662
| Access Period:
887-903
HTML
XML
PDF
Research Article
Parallel Fast Sort Algorithm for Secure Multiparty Computation
Zbigniew Marszałek
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0488
28-04-2018
Unique: 861 | Total: 1259
| Access Period:
488-514
HTML
XML
PDF
Research Article
Secure Method for Combining Cryptography with Iris Biometrics
Alawi Al-Saggaf
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0341
28-04-2018
Unique: 806 | Total: 1127
| Access Period:
341-356
HTML
XML
PDF
Research Article
A Note on Variable-Length Codes with Constant Hamming Weights
Peter Fenwick
10.3217/jucs-021-09-1136
01-09-2015
Unique: 691 | Total: 972
| Access Period:
1136-1142
HTML
XML
PDF
Research Article
A Security Real-time Privacy Amplification Scheme in QKD System
Bo Liu
,
Baokang Zhao
,
Bo Liu
,
Chunqing Wu
Part of: Information Security
10.3217/jucs-019-16-2420
01-10-2013
Unique: 827 | Total: 1117
| Access Period:
2420-2436
HTML
XML
PDF
Research Article
Low Complexity H.264/AVC Intraframe Coding for Wireless Multimedia Sensor Network
Xingang Liu
,
Jiantan Liu
,
Kook-Yeol Yoo
,
Haengrae Cho
Part of: Internet of Things
10.3217/jucs-018-09-1177
01-05-2012
Unique: 861 | Total: 1166
| Access Period:
1177-1193
HTML
XML
PDF
Research Article
Information Theoretically Secure Encryption with Almost Free Authentication
Basel Alomair
,
Radha Poovendran
10.3217/jucs-015-15-2937
01-09-2009
Unique: 663 | Total: 889
| Access Period:
2937-2956
HTML
XML
PDF
1
2
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK