Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
61
62
63
64
65
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Sentiment and Behaviour Annotation in a Corpus of Dialogue Summaries
Norton Roman
,
Paul Piwek
,
Ariadne Maria Brito Rizzoni Carvalho
,
Alexandre Alvares
10.3217/jucs-021-04-0561
01-04-2015
Unique: 469 | Total: 616
| Access Period:
561-586
HTML
XML
PDF
Research Article
RITA: a useR Interface evaluaTion frAmework
Selem Charfi
,
Houcine Ezzedine
,
Christophe Kolski
10.3217/jucs-021-04-0526
01-04-2015
Unique: 488 | Total: 632
| Access Period:
526-560
HTML
XML
PDF
Research Article
Heuristic Algorithms for Manufacturing and Replacement Strategies of the Production System
Robert Bucki
,
Bronislav Chramcov
,
Petr Suchánek
10.3217/jucs-021-04-0503
01-04-2015
Unique: 501 | Total: 688
| Access Period:
503-525
HTML
XML
PDF
Editorial
Managing Editor's Column
Christian Gütl
10.3217/jucs-021-04
01-04-2015
Unique: 410 | Total: 549
| Access Period:
502-502
HTML
XML
PDF
Research Article
Multi-Authority Attribute-Based Encryption Scheme from Lattices
Guoyan Zhang
,
Jing Qin
,
Shams Qazi
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0483
01-03-2015
Unique: 499 | Total: 646
| Access Period:
483-501
HTML
XML
PDF
Research Article
Insecurity of an Efficient Privacy-preserving Public Auditing Scheme for Cloud Data Storage
Hongyu Liu
,
Leiting Chen
,
Zahra Davar
,
Mohammad Pour
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0473
01-03-2015
Unique: 495 | Total: 672
| Access Period:
473-482
HTML
XML
PDF
Research Article
An Improved Cloud Data Sharing Scheme with Hierarchical Attribute Structure
Zhusong Liu
,
Hongyang Yan
,
Zhiqiang Lin
,
Lingling Xu
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0454
01-03-2015
Unique: 491 | Total: 641
| Access Period:
454-472
HTML
XML
PDF
Research Article
Searchable Public-Key Encryption with Data Sharing in Dynamic Groups for Mobile Cloud Storage
Qi Xia
,
Jianbing Ni
,
Ansuura John Bosco Aristotle Kanpogninge
,
James Gee
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0440
01-03-2015
Unique: 473 | Total: 580
| Access Period:
440-453
HTML
XML
PDF
Research Article
Restricted Identification Secure in the Extended Canetti-Krawczyk Model
Lucjan Hanzlik
,
Mirosław Kutyłowski
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0419
01-03-2015
Unique: 488 | Total: 618
| Access Period:
419-439
HTML
XML
PDF
Research Article
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks
Chien-Ming Chen
,
Tsu-Yang Wu
,
Raylin Tso
,
Masahiro Mambo
,
Mu-En Wu
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0406
01-03-2015
Unique: 545 | Total: 706
| Access Period:
406-418
HTML
XML
PDF
Research Article
A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks
Xiaoding Wang
,
Li Xu
,
Shuming Zhou
,
Joseph Liu
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0384
01-03-2015
Unique: 541 | Total: 680
| Access Period:
384-405
HTML
XML
PDF
Research Article
Polymorphic Malicious JavaScript Code Detection for APT Attack Defence
Junho Choi
,
Chang Choi
,
Ilsun You
,
Pankoo Kim
Part of: Recent Advances in Security and Privacy in Big Data
10.3217/jucs-021-03-0369
01-03-2015
Unique: 557 | Total: 723
| Access Period:
369-383
HTML
XML
PDF
61
62
63
64
65
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK