Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2629)
Editorial
(398)
by Journal
by Funding Agency
Clear filters
Powered by
263 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: Topic C - Computer Systems Organization
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
CCA-Secure Deterministic Identity-Based Encryption Scheme
Meijuan Huang
,
Bo Yang
,
Yi Zhao
,
Kaitai Liang
,
Liang Xue
,
Xiaoyi Yang
Part of: Advances of Provable Security Techniques
10.3217/jucs-025-03-0245
28-03-2019
Unique: 748 | Total: 1372
| Access Period:
245-269
HTML
XML
PDF
Research Article
Methods for Information Hiding in Open Social Networks
Jędrzej Bieniasz
,
Krzysztof Szczypiorski
10.3217/jucs-025-02-0074
28-02-2019
Unique: 672 | Total: 1193
| Access Period:
74-97
HTML
XML
PDF
Research Article
Dynamic Estimation of Temporary Failure in SoC FPGAs for Heterogeneous Applications
J. Kokila
,
N. Ramasubramanian
,
Ravindra Thamma
Part of: Quality and Reliability Engineering: Trends and Future Directions
10.3217/jucs-024-12-1776
28-12-2018
Unique: 523 | Total: 703
| Access Period:
1776-1799
HTML
XML
PDF
Research Article
An Architecture for IoT Management Targeted to Context Awareness of Ubiquitous Applications
Rodrigo Souza
,
João Lopes
,
Cláudio Geyer
,
Anderson Cardozo
,
Adenauer Yamin
,
Jorge Luis Victória Barbosa
10.3217/jucs-024-10-1452
28-10-2018
Unique: 527 | Total: 717
| Access Period:
1452-1471
HTML
XML
PDF
Research Article
Crumbling Walls Log Quorum System-based Name Resolution Routing for CCN based IoT
Pir Shah
,
Peer Shah
,
Sadaf Yasmin
,
Zahoor Ur-Rehman
,
Akhlaque Ahmad
,
Yunyoung Nam
,
Seungmin Rho
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1282
28-09-2018
Unique: 624 | Total: 1156
| Access Period:
1282-1305
HTML
XML
PDF
Research Article
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
Nipon Theera-Umpon
,
Kun-Hee Han
,
Woo-Sik Bae
,
Sanghyuk Lee
,
Van Pham
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1258
28-09-2018
Unique: 505 | Total: 700
| Access Period:
1258-1270
HTML
XML
PDF
Research Article
SOMSteg - Framework for Covert Channel, and its Detection, within HTTP
Waldemar Graniszewski
,
Jacek Krupski
,
Krzysztof Szczypiorski
10.3217/jucs-024-07-0864
28-07-2018
Unique: 600 | Total: 794
| Access Period:
864-891
HTML
XML
PDF
Research Article
Advanced Analysis of Data Streams for Critical Infrastructures Protection and Cybersecurity
Barbara Bobowska
,
Michał Choraś
,
Michał Woźniak
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0622
28-05-2018
Unique: 512 | Total: 697
| Access Period:
622-633
HTML
XML
PDF
Research Article
Design of Cognitive Fog Computing for Autonomic Security System in Critical Infrastructure
S. Prabavathy
,
K. Sundarakantham
,
S. Mercy Shalinie
Part of: Technical and Social Aspects of Critical Infrastructure Security
10.3217/jucs-024-05-0577
28-05-2018
Unique: 801 | Total: 1017
| Access Period:
577-602
HTML
XML
PDF
Research Article
A Fine-Grained Hardware Security Approach for Runtime Code Integrity in Embedded Systems
Xiang Wang
,
Weike Wang
,
Bin Xu
,
Pei Du
,
Lin Li
,
Muyang Liu
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0515
28-04-2018
Unique: 447 | Total: 612
| Access Period:
515-536
HTML
XML
PDF
Research Article
Secure Method for Combining Cryptography with Iris Biometrics
Alawi Al-Saggaf
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0341
28-04-2018
Unique: 463 | Total: 643
| Access Period:
341-356
HTML
XML
PDF
Research Article
Developing a BYOD Scale to Measure the Readiness Level: Validity and Reliability Analyses
Murat Topaloglu
,
Dilek Kırar
Part of: Mobile Learning and Instructional Mobile Applications
10.3217/jucs-023-12-1113
28-12-2017
Unique: 569 | Total: 713
| Access Period:
1113-1131
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK