Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2635)
Editorial
(399)
by Journal
by Funding Agency
Clear filters
Powered by
62 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.4.6 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Stability in Heterogeneous Multimedia Networks under Adversarial Attacks
Dimitrios Koukopoulos
10.3217/jucs-015-02-0444
28-01-2009
Unique: 315 | Total: 377
| Access Period:
444-464
HTML
XML
PDF
Research Article
Non-repudiation Mechanism of Agent-based Mobile Payment Systems: Perspectives on Wireless PKI
Chung-Ming Ou
,
Chung-Ren Ou
10.3217/jucs-014-14-2309
28-07-2008
Unique: 331 | Total: 397
| Access Period:
2309-2328
HTML
XML
PDF
Research Article
ASM Refinement Preserving Invariants
Gerhard Schellhorn
10.3217/jucs-014-12-1929
28-06-2008
Unique: 353 | Total: 399
| Access Period:
1929-1948
HTML
XML
PDF
Research Article
Efficient k-out-of-n Oblivious Transfer Schemes
Cheng-Kang Chu
,
Wen-Guey Tzeng
10.3217/jucs-014-03-0397
01-02-2008
Unique: 347 | Total: 396
| Access Period:
397-415
HTML
XML
PDF
Research Article
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
Christian Rechberger
,
Vincent Rijmen
10.3217/jucs-014-03-0347
01-02-2008
Unique: 398 | Total: 523
| Access Period:
347-376
HTML
XML
PDF
Research Article
Internet Payment System: A New Payment System for Internet Transactions
Zoran Đurić
,
Ognjen Marić
,
Dragan Gašević
10.3217/jucs-013-04-0479
28-04-2007
Unique: 354 | Total: 439
| Access Period:
479-503
HTML
XML
PDF
Research Article
RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption
Aleksandra Nenadic
,
Ning Zhang
,
Barry Cheetham
,
Carole Goble
10.3217/jucs-011-01-0175
28-01-2005
Unique: 333 | Total: 429
| Access Period:
175-192
HTML
XML
PDF
Research Article
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention
Sachin Joglekar
,
Stephen Tate
10.3217/jucs-011-01-0083
28-01-2005
Unique: 320 | Total: 378
| Access Period:
83-103
HTML
XML
PDF
Research Article
Increasing Robustness of LSB Audio Steganography by Reduced Distortion LSB Coding
Nedeljko Cvejic
,
Tapio Seppänen
10.3217/jucs-011-01-0056
28-01-2005
Unique: 339 | Total: 392
| Access Period:
56-65
HTML
XML
PDF
Research Article
Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks
In Khor
,
Johnson Thomas
,
Istvan Jonyer
10.3217/jucs-011-01-0037
28-01-2005
Unique: 342 | Total: 398
| Access Period:
37-55
HTML
XML
PDF
Research Article
Low-Intrusive Consistent Disk Checkpointing: A Tool for Digital Forensics
Sriranjani Sitaraman
,
S. Venkatesan
10.3217/jucs-011-01-0020
28-01-2005
Unique: 329 | Total: 374
| Access Period:
20-36
HTML
XML
PDF
Research Article
Physically Locating Wireless Intruders
Frank Adelstein
,
Prasanth Alla
,
Rob Joyce
,
Golden G. Richard Iii
10.3217/jucs-011-01-0004
28-01-2005
Unique: 352 | Total: 417
| Access Period:
4-19
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK