Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
136
137
138
139
140
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
DS RBAC - Dynamic Sessions in Role Based Access Control
Joerg Muehlbacher
,
Christian Praher
10.3217/jucs-015-03-0538
01-02-2009
Unique: 413 | Total: 476
| Access Period:
538-554
HTML
XML
PDF
Research Article
Linear and Quadratic Complexity Bounds on the Values of the Positive Roots of Polynomials
Alkiviadis Akritas
10.3217/jucs-015-03-0523
01-02-2009
Unique: 324 | Total: 390
| Access Period:
523-537
HTML
XML
PDF
Research Article
Advances in Homomorphic Cryptosystems
Mufutau Akinwande
10.3217/jucs-015-03-0506
01-02-2009
Unique: 387 | Total: 464
| Access Period:
506-522
HTML
XML
PDF
Editorial
Managing Editor's Column
Hermann Maurer
10.3217/jucs-015-03
01-02-2009
Unique: 308 | Total: 344
| Access Period:
505-505
HTML
XML
PDF
Research Article
A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
Chin-Ling Chen
10.3217/jucs-015-02-0488
28-01-2009
Unique: 330 | Total: 394
| Access Period:
488-504
HTML
XML
PDF
Research Article
The Topology Change Attack: Threat and Impact
Mahdi Abdelouahab
,
Abdelmadjid Bouabdallah
,
Mohamed Achemlal
,
Sylvie Laniepce
10.3217/jucs-015-02-0465
28-01-2009
Unique: 307 | Total: 386
| Access Period:
465-487
HTML
XML
PDF
Research Article
Stability in Heterogeneous Multimedia Networks under Adversarial Attacks
Dimitrios Koukopoulos
10.3217/jucs-015-02-0444
28-01-2009
Unique: 364 | Total: 435
| Access Period:
444-464
HTML
XML
PDF
Research Article
On the Design of Secure Multimedia Authentication
Jinwei Wang
,
Jianmin Lü
,
Shiguo Lian
,
Guangjie Liu
10.3217/jucs-015-02-0426
28-01-2009
Unique: 336 | Total: 379
| Access Period:
426-443
HTML
XML
PDF
Research Article
On the Superdistribution of Digital Goods
Andreas Schmidt
10.3217/jucs-015-02-0401
28-01-2009
Unique: 355 | Total: 398
| Access Period:
401-425
HTML
XML
PDF
Editorial
Multimedia Security in Communication (MUSIC)
Shiguo Lian
,
Yan Zhang
,
Stefanos Gritzalis
,
Yu Chen
10.3217/jucs-015-02
28-01-2009
Unique: 461 | Total: 505
| Access Period:
398-400
HTML
XML
PDF
Research Article
Dynamic Data Warehouse Design with Abstract State Machines
Jane Zhao
,
Klaus-Dieter Schewe
,
Henning Köhler
10.3217/jucs-015-01-0355
01-01-2009
Unique: 313 | Total: 373
| Access Period:
355-397
HTML
XML
PDF
Research Article
A Characterisation of Coincidence Ideals for Complex Values
Attila Sali
,
Klaus-Dieter Schewe
10.3217/jucs-015-01-0304
01-01-2009
Unique: 340 | Total: 401
| Access Period:
304-354
HTML
XML
PDF
136
137
138
139
140
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK