Abstract is missing.
- Improved task partition based fault-tolerant rate-monotonic scheduling algorithmPengze Guo, Zhi Xue. 1-5 [doi]
- Cube attack on reduced-round Enhanced-BiviumShiyong Zhang, Gongliang Chen, Jianhua Li. 1-4 [doi]
- A challenge-response authentication for RFID using Enhanced-TriviumSiye Wang, Shiyong Zhang, Lifeng Liu, Gongliang Chen. 1-5 [doi]
- Security authentication mechanism based on symmetric polynomials for SCADA systemsYue Lu, Xiuzhen Chen, Changsong Chen 0002. 1-6 [doi]
- Clustering methods comparison: Application to source based detection of botcloudsBadis Hammi, Mohamed Cherif Rahal, Rida Khatoun. 1-7 [doi]
- Channel aware resource allocation for device-to-device communication underlaying cellular networksJunhua Tang, Shujun Lin, Cunqing Hua, Yue Wu, Jianhua Li. 1-5 [doi]
- Securing tactical service oriented architecturesVasileios Gkioulos, Stephen D. Wolthusen. 1-6 [doi]
- An approach based on the clustering coefficient for the community detection in social networksKhawla Asmi, Dounia Lotfi, Mohamed El Marraki. 1-8 [doi]
- The performance impact of encryption in an asynchronous cloud environmentAndrei F. Klein, Mihai Stefanescu, Alan Saied, Kurt Swakhoven. 1-6 [doi]
- Multiple SDN controller orchestration for financial cloudYongkai Zhou, Hang Yuan, Lijun Zu, Guobao Liu, Ge Li. 1-6 [doi]
- Secure range query based on privacy-preserving function in two-tiered sensor networksPeng Chen, Weini Zeng, Yong Zhu, Yingyan Gu. 1-6 [doi]
- Cooperation behavior of vehicles in an evolutionary game for information disseminationJun Zhang, Houda Labiod, Mengying Ren, Hengchuan Tan. 1-8 [doi]
- Toward interests drift mechanism for social networkYutao Zhang, Gongshen Liu, Jun Wu, Jianhua Li, Longhua Guo. 1-5 [doi]
- Evaluation of RAIN RFID authentication schemesAhmad Shahrafidz Khalid, Emmanuel Conchon, Fabrice Peyrard. 1-8 [doi]