Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2635)
Editorial
(399)
by Journal
by Funding Agency
Clear filters
Powered by
142 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: Topic E - Data
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
6
7
8
9
10
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Certificate-based Signatures Revisited
Wei Wu
,
Yi Mu
,
Willy Susilo
,
Xinyi Huang
10.3217/jucs-015-08-1659
28-04-2009
Unique: 338 | Total: 383
| Access Period:
1659-1684
HTML
XML
PDF
Research Article
Light-Weight Key Exchange with Different Passwords in the Standard Model
Jeong Kwon
,
Ik Jeong
,
Dong Lee
10.3217/jucs-015-05-1042
01-03-2009
Unique: 334 | Total: 394
| Access Period:
1042-1064
HTML
XML
PDF
Research Article
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments
Changhoon Lee
,
Jongsung Kim
,
Seokhie Hong
,
Yang-Sun Lee
10.3217/jucs-015-05-1007
01-03-2009
Unique: 369 | Total: 424
| Access Period:
1007-1022
HTML
XML
PDF
Research Article
Complexity Analysis of Ontology Integration Methodologies:a Comparative Study
Trong Duong
,
Geun-Sik Jo
,
Jason Jung
,
Ngoc Nguyen
10.3217/jucs-015-04-0877
28-02-2009
Unique: 392 | Total: 487
| Access Period:
877-897
HTML
XML
PDF
Research Article
Advances in Homomorphic Cryptosystems
Mufutau Akinwande
10.3217/jucs-015-03-0506
01-02-2009
Unique: 359 | Total: 428
| Access Period:
506-522
HTML
XML
PDF
Research Article
Learner Course Recommendation in e-Learning Based on Swarm Intelligence
Ana-Belén Gil
,
Francisco García-Peñalvo
10.3217/jucs-014-16-2737
28-08-2008
Unique: 340 | Total: 418
| Access Period:
2737-2755
HTML
XML
PDF
Research Article
Non-repudiation Mechanism of Agent-based Mobile Payment Systems: Perspectives on Wireless PKI
Chung-Ming Ou
,
Chung-Ren Ou
10.3217/jucs-014-14-2309
28-07-2008
Unique: 338 | Total: 405
| Access Period:
2309-2328
HTML
XML
PDF
Research Article
Spatial Queries in Road Networks Based on PINE
Maytham Safar
10.3217/jucs-014-04-0590
28-02-2008
Unique: 339 | Total: 417
| Access Period:
590-611
HTML
XML
PDF
Research Article
Parallel Formulations of Scalar Multiplication on Koblitz Curves
Omran Ahmadi
,
Darrel Hankerson
,
Francisco Rodríguez-Henríquez
10.3217/jucs-014-03-0481
01-02-2008
Unique: 404 | Total: 517
| Access Period:
481-504
HTML
XML
PDF
Research Article
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Yong Hwang
,
Joseph Liu
,
Sherman Chow
10.3217/jucs-014-03-0463
01-02-2008
Unique: 320 | Total: 367
| Access Period:
463-480
HTML
XML
PDF
Research Article
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Liqun Chen
,
Qiang Tang
10.3217/jucs-014-03-0416
01-02-2008
Unique: 346 | Total: 407
| Access Period:
416-440
HTML
XML
PDF
Research Article
Efficient k-out-of-n Oblivious Transfer Schemes
Cheng-Kang Chu
,
Wen-Guey Tzeng
10.3217/jucs-014-03-0397
01-02-2008
Unique: 356 | Total: 408
| Access Period:
397-415
HTML
XML
PDF
6
7
8
9
10
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK