Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2666)
Editorial
(404)
by Journal
by Funding Agency
Clear filters
Powered by
64 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: D.4.6 - Security and Protection
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Observations of Skipjack-like Structure with SP/SPS Round Function
Ting Cui
,
Chenhui Jin
,
Guoshuang Zhang
Part of: Information Security
10.3217/jucs-019-16-2453
01-10-2013
Unique: 557 | Total: 718
| Access Period:
2453-2471
HTML
XML
PDF
Research Article
Applying Professional Solutions within the Educational Environments by Means of Cloud Computing: Coaching for Teachers
Habib Fardoun
,
Abdulfattah Mashat
,
Sebastián López
10.3217/jucs-019-12-1703
28-06-2013
Unique: 767 | Total: 1113
| Access Period:
1703-1717
HTML
XML
PDF
Research Article
Interactive Design System for Schools using Cloud Computing
Habib Fardoun
,
Bassam Zafar
,
Abdulrahman Altalhi
,
Antonio Paules
Part of: Interaction Design in Educational Environments
10.3217/jucs-019-07-0950
01-04-2013
Unique: 693 | Total: 951
| Access Period:
950-964
HTML
XML
PDF
Research Article
Engineering Security into Distributed Systems: A Survey of Methodologies
Anton Uzunov
,
Eduardo Fernandez
,
Katrina Falkner
10.3217/jucs-018-20-2920
01-12-2012
Unique: 671 | Total: 831
| Access Period:
2920-3006
HTML
XML
PDF
Research Article
New Results of Related-key Attacks on All Py-Family of Stream Ciphers
Lin Ding
,
Jie Guan
,
Wen-long Sun
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1741
28-06-2012
Unique: 634 | Total: 776
| Access Period:
1741-1756
HTML
XML
PDF
Research Article
Security Analysis of Three Password Authentication Schemes
Kyung-Ah Shim
10.3217/jucs-017-11-1623
01-07-2011
Unique: 437 | Total: 521
| Access Period:
1623-1633
HTML
XML
PDF
Research Article
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
Khaled Salah
,
Mojeeb-Al-Rhman Al-Khiaty
,
Rashad Ahmed
,
Adnan Mahdi
10.3217/jucs-017-11-1605
01-07-2011
Unique: 548 | Total: 739
| Access Period:
1605-1622
HTML
XML
PDF
Research Article
A Trusted Computing Identity Collation Protocol to Simplify Deployment of New Disaster Response Devices
Peter Danner
,
Daniel Hein
10.3217/jucs-016-09-1139
01-05-2010
Unique: 447 | Total: 504
| Access Period:
1139-1151
HTML
XML
PDF
Research Article
VIMM: Runtime Integrity Measurement of a Virtualized Operating System
Chun Suen
10.3217/jucs-016-04-0554
28-02-2010
Unique: 443 | Total: 548
| Access Period:
554-576
HTML
XML
PDF
Research Article
Towards a Virtual Trusted Platform
Martin Pirker
,
Ronald Toegl
10.3217/jucs-016-04-0531
28-02-2010
Unique: 486 | Total: 827
| Access Period:
531-542
HTML
XML
PDF
Research Article
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers
Pino Caballero-Gil
,
Amparo Fúster-Sabater
,
Candelaria Hernández-Goya
10.3217/jucs-015-15-2981
01-09-2009
Unique: 443 | Total: 512
| Access Period:
2981-2998
HTML
XML
PDF
Research Article
Light-Weight Key Exchange with Different Passwords in the Standard Model
Jeong Kwon
,
Ik Jeong
,
Dong Lee
10.3217/jucs-015-05-1042
01-03-2009
Unique: 431 | Total: 504
| Access Period:
1042-1064
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK