Skip to the main content
  • Publication date: 18.12.2015.
  • Published on HRČAK: 18.12.2015.

Table of contents

Full text

Editorial (page I-II)

Vlado Glavinić
Editorial


Guest Editorial (page III-IV)

Hong Zhao, Kevin Kwiat
Editorial


Detecting and Locating Man-in-the-Middle Attacks in Fixed Wireless Networks (page 283-293)

Ziqian (Cecilia) Dong, Randolph Espejo, Yu Wan, Wenjie Zhuang
Original scientific paper


Analysis on the Performance of Server-less RFID Searching Protocol (page 295-302)

Ping Huang, Haibing Mu, Fei Zeng
Original scientific paper


A Risk and Similarity Aware Application Recommender System (page 303-315)

Xiaoyuan Liang, Jie Tian, Xiaoning Ding, Guiling Wang
Original scientific paper


Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata (page 317-328)

Alaa Eddine Belfedhal, Kamel Mohamed Faraoun
Original scientific paper


Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security (page 329-340)

Charles McGuffey, Chen Liu, Stephanie Schuckers
Original scientific paper


Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing (page 341-355)

Ching-Nung Yang, Jia-Bin Lai, Zhangjie Fu
Original scientific paper


Author Index (page 357-359)


Index


Subject Index (page 361-362)


Index


List of Referees (page 363-366)


Index


List of Invited Section Editors (page 367-367)


Index


Visits: 12.476 *