Register
|
Login
Full Text
Author
Title
Submit manuscript
About
News
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2717)
Editorial
(414)
by Journal
by Funding Agency
Clear filters
Powered by
17 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: L.4.0 - Security and Trust
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
Nipon Theera-Umpon
,
Kun-Hee Han
,
Woo-Sik Bae
,
Sanghyuk Lee
,
Van Pham
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1258
28-09-2018
Unique: 892 | Total: 1252
| Access Period:
1258-1270
HTML
XML
PDF
Research Article
Identifying Encryption Algorithms in ECB and CBC Modes Using Computational Intelligence
Flavio De Mello
,
José A. M. Xexéo
10.3217/jucs-024-01-0025
28-01-2018
Unique: 1038 | Total: 1557
| Access Period:
25-42
HTML
XML
PDF
Research Article
Showing the Benefits of Applying a Model Driven Architecture for Developing Secure OLAP Applications
Carlos Blanco
,
Ignacio De Guzmán
,
Eduardo Fernández-Medina
,
Juan Trujillo
10.3217/jucs-020-02-0079
01-02-2014
Unique: 1090 | Total: 1557
| Access Period:
79-106
HTML
XML
PDF
Research Article
Cost-Sensitive Spam Detection Using Parameters Optimization and Feature Selection
Sang Lee
,
Dong Kim
,
Jong Park
10.3217/jucs-017-06-0944
28-03-2011
Unique: 535 | Total: 659
| Access Period:
944-960
HTML
XML
PDF
Research Article
DS RBAC - Dynamic Sessions in Role Based Access Control
Joerg Muehlbacher
,
Christian Praher
10.3217/jucs-015-03-0538
01-02-2009
Unique: 690 | Total: 856
| Access Period:
538-554
HTML
XML
PDF
1
2
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK