|
Journals by scientific areas
Journal editors
Authors
Policies & exchange
|
Publication date: December 2015
Published on HRČAK: 18 December 2015
Table of contents |
Full text |
Editorial
(str.I-II)
|
englishpdf 89 KB
|
Vlado Glavinić
Editorial
|
|
Guest Editorial
(str.III-IV)
|
englishpdf 82 KB
|
Hong Zhao, Kevin Kwiat
Editorial
|
|
Detecting and Locating Man-in-the-Middle Attacks in Fixed Wireless Networks
(str.283-293)
|
englishpdf 904 KB
|
Ziqian (Cecilia) Dong, Randolph Espejo, Yu Wan, Wenjie Zhuang
Original scientific paper
|
|
Analysis on the Performance of Server-less RFID Searching Protocol
(str.295-302)
|
englishpdf 583 KB
|
Ping Huang, Haibing Mu, Fei Zeng
Original scientific paper
|
|
A Risk and Similarity Aware Application Recommender System
(str.303-315)
|
englishpdf 1 MB
|
Xiaoyuan Liang, Jie Tian, Xiaoning Ding, Guiling Wang
Original scientific paper
|
|
Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata
(str.317-328)
|
englishpdf 850 KB
|
Alaa Eddine Belfedhal, Kamel Mohamed Faraoun
Original scientific paper
|
|
Hardware Accelerator Approach Towards Efficient Biometric Cryptosystems for Network Security
(str.329-340)
|
englishpdf 688 KB
|
Charles McGuffey, Chen Liu, Stephanie Schuckers
Original scientific paper
|
|
Protecting User Privacy for Cloud Computing by Bivariate Polynomial Based Secret Sharing
(str.341-355)
|
englishpdf 1 MB
|
Ching-Nung Yang, Jia-Bin Lai, Zhangjie Fu
Original scientific paper
|
|
Author Index
(str.357-359)
|
englishpdf 70 KB
|
Index
|
|
Subject Index
(str.361-362)
|
englishpdf 55 KB
|
Index
|
|
List of Referees
(str.363-366)
|
englishpdf 84 KB
|
Index
|
|
List of Invited Section Editors
(str.367-367)
|
englishpdf 52 KB
|
Index
|
|
|
Contact
My profile
Register
Authorization type change
|