Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2635)
Editorial
(399)
by Journal
by Funding Agency
Clear filters
Powered by
142 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: Topic E - Data
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
6
7
8
9
10
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Enabling User Access Control in Energy-constrained Wireless Smart Environments
Juan Álvaro Muñoz Naranjo
,
Pablo Orduña
,
Aitor Gómez-Goiri
,
Diego López-De-Ipiña
,
Leocadio Casado
Part of: Towards Sustainable Computing through Ambient Intelligence
10.3217/jucs-019-17-2490
01-11-2013
Unique: 550 | Total: 695
| Access Period:
2490-2502
HTML
XML
PDF
Research Article
Observations of Skipjack-like Structure with SP/SPS Round Function
Ting Cui
,
Chenhui Jin
,
Guoshuang Zhang
Part of: Information Security
10.3217/jucs-019-16-2453
01-10-2013
Unique: 448 | Total: 586
| Access Period:
2453-2471
HTML
XML
PDF
Research Article
A Security Real-time Privacy Amplification Scheme in QKD System
Bo Liu
,
Baokang Zhao
,
Bo Liu
,
Chunqing Wu
Part of: Information Security
10.3217/jucs-019-16-2420
01-10-2013
Unique: 512 | Total: 675
| Access Period:
2420-2436
HTML
XML
PDF
Research Article
Graph-based KNN Algorithm for Spam SMS Detection
Tran Ho
,
Ho-Seok Kang
,
Sung-Ryul Kim
Part of: Information Security
10.3217/jucs-019-16-2404
01-10-2013
Unique: 592 | Total: 759
| Access Period:
2404-2419
HTML
XML
PDF
Research Article
Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier
Leandro Marin
,
Antonio Jara
,
Antonio Skarmeta
Part of: Information Security
10.3217/jucs-019-16-2368
01-10-2013
Unique: 549 | Total: 730
| Access Period:
2368-2384
HTML
XML
PDF
Research Article
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing
Xingxing Xie
,
Hua Ma
,
Jin Li
,
Xiaofeng Chen
Part of: Information Security
10.3217/jucs-019-16-2349
01-10-2013
Unique: 511 | Total: 637
| Access Period:
2349-2367
HTML
XML
PDF
Research Article
An Integrated MFFP-tree Algorithm for Mining Global Fuzzy Rules from Distributed Databases
Chun-Wei Lin
,
Tzung-Pei Hong
,
Yi-Fan Chen
,
Tsung-Ching Lin
,
Shing-Tai Pan
Part of: Hybrid and Ensemble Methods in Machine Learning
10.3217/jucs-019-04-0521
28-02-2013
Unique: 563 | Total: 770
| Access Period:
521-538
HTML
XML
PDF
Research Article
New Results of Related-key Attacks on All Py-Family of Stream Ciphers
Lin Ding
,
Jie Guan
,
Wen-long Sun
Part of: An Overview of Current Information Systems Security Challenges and Innovations
10.3217/jucs-018-12-1741
28-06-2012
Unique: 519 | Total: 641
| Access Period:
1741-1756
HTML
XML
PDF
Research Article
Low Complexity H.264/AVC Intraframe Coding for Wireless Multimedia Sensor Network
Xingang Liu
,
Jiantan Liu
,
Kook-Yeol Yoo
,
Haengrae Cho
Part of: Internet of Things
10.3217/jucs-018-09-1177
01-05-2012
Unique: 525 | Total: 683
| Access Period:
1177-1193
HTML
XML
PDF
Research Article
Modeling and Performance Evaluation of a Contract-based Electronic Signature Process
Ahmed Nait-Sidi-Moh
,
Mohamed Bakhouya
,
Wafaa Ait-Cheik-Bihi
,
Jaafar Gaber
10.3217/jucs-018-05-0676
01-03-2012
Unique: 582 | Total: 771
| Access Period:
676-703
HTML
XML
PDF
Research Article
Key Person Analysis in Social Communities within the Blogosphere
Anna Zygmunt
,
Piotr Bródka
,
Przemysław Kazienko
,
Jarosław Koźlak
Part of: Advances on Social Network Applications
10.3217/jucs-018-04-0577
28-02-2012
Unique: 628 | Total: 843
| Access Period:
577-597
HTML
XML
PDF
Research Article
Security Analysis of Three Password Authentication Schemes
Kyung-Ah Shim
10.3217/jucs-017-11-1623
01-07-2011
Unique: 341 | Total: 407
| Access Period:
1623-1633
HTML
XML
PDF
6
7
8
9
10
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK