Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2648)
Editorial
(401)
by Journal
by Funding Agency
Clear filters
Powered by
Articles
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
76
77
78
79
80
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
MECCANO: a Mobile-Enabled Configuration Framework to Coordinate and Augment Networks of Smart Objects
Ana Bernardos
,
Luca Bergesio
,
Josue Iglesias
,
José Casar
Part of: Towards Sustainable Computing through Ambient Intelligence
10.3217/jucs-019-17-2503
01-11-2013
Unique: 537 | Total: 672
| Access Period:
2503-2525
HTML
XML
PDF
Research Article
Enabling User Access Control in Energy-constrained Wireless Smart Environments
Juan Álvaro Muñoz Naranjo
,
Pablo Orduña
,
Aitor Gómez-Goiri
,
Diego López-De-Ipiña
,
Leocadio Casado
Part of: Towards Sustainable Computing through Ambient Intelligence
10.3217/jucs-019-17-2490
01-11-2013
Unique: 588 | Total: 745
| Access Period:
2490-2502
HTML
XML
PDF
Editorial
Towards Sustainable Computing through Ambient Intelligence
Diego López-De-Ipiña
,
José Bravo
Part of: Towards Sustainable Computing through Ambient Intelligence
10.3217/jucs-019-17
01-11-2013
Unique: 448 | Total: 578
| Access Period:
2486-2489
HTML
XML
PDF
Research Article
Text Analysis for Monitoring Personal Information Leakage on Twitter
Dongjin Choi
,
Jeongin Kim
,
Xeufeng Piao
,
Pankoo Kim
Part of: Information Security
10.3217/jucs-019-16-2472
01-10-2013
Unique: 567 | Total: 721
| Access Period:
2472-2485
HTML
XML
PDF
Research Article
Observations of Skipjack-like Structure with SP/SPS Round Function
Ting Cui
,
Chenhui Jin
,
Guoshuang Zhang
Part of: Information Security
10.3217/jucs-019-16-2453
01-10-2013
Unique: 479 | Total: 630
| Access Period:
2453-2471
HTML
XML
PDF
Research Article
Security Issues and Attacks on the GSM Standard: a Review
Giuseppe Cattaneo
,
Giancarlo Maio
,
Umberto Petrillo
Part of: Information Security
10.3217/jucs-019-16-2437
01-10-2013
Unique: 882 | Total: 1186
| Access Period:
2437-2452
HTML
XML
PDF
Research Article
A Security Real-time Privacy Amplification Scheme in QKD System
Bo Liu
,
Baokang Zhao
,
Bo Liu
,
Chunqing Wu
Part of: Information Security
10.3217/jucs-019-16-2420
01-10-2013
Unique: 538 | Total: 716
| Access Period:
2420-2436
HTML
XML
PDF
Research Article
Graph-based KNN Algorithm for Spam SMS Detection
Tran Ho
,
Ho-Seok Kang
,
Sung-Ryul Kim
Part of: Information Security
10.3217/jucs-019-16-2404
01-10-2013
Unique: 639 | Total: 828
| Access Period:
2404-2419
HTML
XML
PDF
Research Article
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs
Youngho Park
,
Chul Sur
,
Sanguk Shin
,
Kyung-Hyune Rhee
,
Changho Seo
Part of: Information Security
10.3217/jucs-019-16-2385
01-10-2013
Unique: 525 | Total: 661
| Access Period:
2385-2403
HTML
XML
PDF
Research Article
Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier
Leandro Marin
,
Antonio Jara
,
Antonio Skarmeta
Part of: Information Security
10.3217/jucs-019-16-2368
01-10-2013
Unique: 593 | Total: 793
| Access Period:
2368-2384
HTML
XML
PDF
Research Article
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing
Xingxing Xie
,
Hua Ma
,
Jin Li
,
Xiaofeng Chen
Part of: Information Security
10.3217/jucs-019-16-2349
01-10-2013
Unique: 546 | Total: 681
| Access Period:
2349-2367
HTML
XML
PDF
Editorial
Information Security
Ilsun You
,
Edgar Weippl
Part of: Information Security
10.3217/jucs-019-16
01-10-2013
Unique: 454 | Total: 564
| Access Period:
2347-2348
HTML
XML
PDF
76
77
78
79
80
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK