Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
151
152
153
154
155
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Success Factors in a Weblog Community
Christian Safran
,
Frank Kappe
10.3217/jucs-014-04-0546
28-02-2008
Unique: 353 | Total: 415
| Access Period:
546-556
HTML
XML
PDF
Research Article
Analyzing Wiki-based Networks to Improve Knowledge Processes in Organizations
Claudia Müller
,
Benedikt Meuthrath
,
Anne Baumgraß
10.3217/jucs-014-04-0526
28-02-2008
Unique: 342 | Total: 421
| Access Period:
526-545
HTML
XML
PDF
Research Article
Optimizing Assignment of Knowledge Workers to Office Space Using Knowledge Management CriteriaThe Flexible Office Case
Ronald Maier
,
Stefan Thalmann
,
Florian Bayer
,
Michael Krüger
,
Hendrik Nitz
,
Alexander Sandow
10.3217/jucs-014-04-0508
28-02-2008
Unique: 372 | Total: 433
| Access Period:
508-525
HTML
XML
PDF
Editorial
Managing Editor's Column
Hermann Maurer
10.3217/jucs-014-04
28-02-2008
Unique: 272 | Total: 317
| Access Period:
505-507
HTML
XML
PDF
Research Article
Parallel Formulations of Scalar Multiplication on Koblitz Curves
Omran Ahmadi
,
Darrel Hankerson
,
Francisco Rodríguez-Henríquez
10.3217/jucs-014-03-0481
01-02-2008
Unique: 421 | Total: 540
| Access Period:
481-504
HTML
XML
PDF
Research Article
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Yong Hwang
,
Joseph Liu
,
Sherman Chow
10.3217/jucs-014-03-0463
01-02-2008
Unique: 350 | Total: 408
| Access Period:
463-480
HTML
XML
PDF
Research Article
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
Guomin Yang
,
Duncan Wong
,
Xiaotie Deng
10.3217/jucs-014-03-0441
01-02-2008
Unique: 374 | Total: 420
| Access Period:
441-462
HTML
XML
PDF
Research Article
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Liqun Chen
,
Qiang Tang
10.3217/jucs-014-03-0416
01-02-2008
Unique: 366 | Total: 434
| Access Period:
416-440
HTML
XML
PDF
Research Article
Efficient k-out-of-n Oblivious Transfer Schemes
Cheng-Kang Chu
,
Wen-Guey Tzeng
10.3217/jucs-014-03-0397
01-02-2008
Unique: 391 | Total: 450
| Access Period:
397-415
HTML
XML
PDF
Research Article
Parallel Key Exchange
Ik Jeong
,
Dong Lee
10.3217/jucs-014-03-0377
01-02-2008
Unique: 340 | Total: 378
| Access Period:
377-396
HTML
XML
PDF
Research Article
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Christian Rechberger
,
Vincent Rijmen
10.3217/jucs-014-03-0347
01-02-2008
Unique: 461 | Total: 634
| Access Period:
347-376
HTML
XML
PDF
Research Article
Optimistic Fair Exchange in a Multi-user Setting
Yeveniy Dodis
,
Pil Lee
,
Dae Yum
10.3217/jucs-014-03-0318
01-02-2008
Unique: 364 | Total: 424
| Access Period:
318-346
HTML
XML
PDF
151
152
153
154
155
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK