Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Geodesic
Parcourir par
Revues
Séminaires
Livres
Congrès
Sources
Computer Science and Information Systems
Tome 11 (2014)
no. 3
Précédent
Suivant
Volume 11 (2014) no. 3
Sommaire
A True Random-Number Encryption Method Employing Block Cipher and PRNG
Yi-Li Huang
;
Fang-Yie Leu
;
Jian-Hong Chen
;
William Cheng-Chung Chu
A Secure Mobile DRM System Based on Cloud Architecture
Chin-Ling Chen
;
Woei-Jiunn Tsaur
;
Yu-Yi Chen
;
Yao-Chung Chang
A NEMO-HWSN Solution to Support 6LoWPAN Network Mobility in Hospital Wireless Sensor Network
Mohammadreza Sahebi Shahamabadi
;
Borhanuddin M Ali
;
Nor Kamariah Noordin
;
Mohd Fadlee b. A. Rasid
;
Pooria Varahram
;
Antonio J. Jara
Long Distance Face Recognition for Enhanced Performance of Internet of Things Service Interface
Hae-Min Moon
;
Sung Bum Pan
PPS: A Privacy-Preserving Security Scheme for Multi-operator Wireless Mesh Networks with Enhanced User Experience
Tianhan Gao
;
Nan Guo
;
Kangbin Yim
;
Qianyi Wang
A Computer Remote Control System Based on Speech Recognition Technologies of Mobile Devices and Wireless Communication Technologies
Hae-Duck J. Jeong
;
Sang-Kug Ye
;
Jiyoung Lim
;
Ilsun You
;
WooSeok Hyun
A New Hybrid Architecture with an Intersection-Based Coverage Algorithm in Wireless Sensor Networks
Young-Long Chen
;
Mu-Yen Chen
;
Fu-Kai Cheung
;
Yung-Chi Chang
The Efficient Implementation of Distributed Indexing with Hadoop for Digital Investigations on Big Data
Taerim Lee
;
Hyejoo Lee
;
Kyung-Hyune Rhee
;
Sang Uk Shin
A New Detection Scheme of Software Copyright Infringement using Software Birthmark on Windows Systems
Yongman Han
;
Jongcheon Choi
;
Seong-je Cho
;
Haeyoung Yoo
;
Jinwoon Woo
;
Yunmook Nah
;
Minkyu Park
Pairwise and Group Key Setup Mechanism for Secure Machine-to-Machine Communication
Inshil Doh
;
Jiyoung Lim
;
Shi Li
;
Kijoon Chae
A Secure E-Mail Protocol Using ID-based FNS Multicast Mechanism
Hsing-Chung Chen
;
Cheng-Ying Yang
;
Hui-Kai Su
;
Ching-Chuan Wei
;
Chao-Ching Lee
Study on Network Architecture of Big Data Center for the Efficient Control of Huge Data Traffic
Hyoung Woo Park
;
Il Yeon Yeo
;
Jongsuk Ruth Lee
;
Haengjin Jang
An Efficient Wormhole Attack Detection Method in Wireless Sensor Networks
Guowei Wu
;
Xiaojie Chen
;
Lin Yao
;
Youngjun Lee
;
Kangbin Yim
The Performance Analysis of Direct/Cooperative Transmission to Support QoS in WLANs
Chien-Erh Weng
;
Jyh-Horng Wen
;
Hsing-Chung Chen
;
Lie Yang
Weibo Clustering: A New Approach Utilizing Users’ Reposting Data in Social Networking Services
Guangzhi Zhang
;
Yunchuan Sun
;
Mengling Xu
;
Rongfang Bie
An Approach for Selecting Candidates in Soft-handover Procedure Using Multi-Generating Procedure and Second Grey Relational Analysis
Neng-Yih Shih
;
Hsing-Chung Chen (Jack Chen)