Skoči na glavni sadržaj
  • Datum izdavanja: 18.12.2015.
  • Objavljen na Hrčku: 18.12.2015.

Sadržaj

Puni tekst

Editorial (str. I-II)

Vlado Glavinić
Uvodnik


Guest Editorial (str. III-IV)

Hong Zhao, Kevin Kwiat
Uvodnik


Detecting and Locating Man-in-the-Middle Attacks in Fixed Wireless Networks (str. 283-293)

Ziqian (Cecilia) Dong, Randolph Espejo, Yu Wan, Wenjie Zhuang
Izvorni znanstveni članak


Analysis on the Performance of Server-less RFID Searching Protocol (str. 295-302)

Ping Huang, Haibing Mu, Fei Zeng
Izvorni znanstveni članak


A Risk and Similarity Aware Application Recommender System (str. 303-315)

Xiaoyuan Liang, Jie Tian, Xiaoning Ding, Guiling Wang
Izvorni znanstveni članak


Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata (str. 317-328)

Alaa Eddine Belfedhal, Kamel Mohamed Faraoun
Izvorni znanstveni članak


Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security (str. 329-340)

Charles McGuffey, Chen Liu, Stephanie Schuckers
Izvorni znanstveni članak


Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing (str. 341-355)

Ching-Nung Yang, Jia-Bin Lai, Zhangjie Fu
Izvorni znanstveni članak


Author Index (str. 357-359)


Kazalo


Subject Index (str. 361-362)


Kazalo


List of Referees (str. 363-366)


Kazalo


List of Invited Section Editors (str. 367-367)


Kazalo


Posjeta: 16.885 *