Works matching IS 09208542 AND DT 2014 AND VI 70 AND IP 1
Results: 27
Design and analysis of a secure and effective emergency system for mountaineering events.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 54, doi. 10.1007/s11227-013-1066-9
- By:
- Publication type:
- Article
An efficient mutual authentication RFID scheme based on elliptic curve cryptography.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 75, doi. 10.1007/s11227-013-1073-x
- By:
- Publication type:
- Article
Biclique cryptanalysis of PRESENT-80 and PRESENT-128.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 95, doi. 10.1007/s11227-014-1103-3
- By:
- Publication type:
- Article
Multilayer cluster designing algorithm for lifetime improvement of wireless sensor networks.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 104, doi. 10.1007/s11227-014-1108-y
- By:
- Publication type:
- Article
An anonymous mobile user authentication protocol using self-certified public keys based on multi-server architectures.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 133, doi. 10.1007/s11227-014-1135-8
- By:
- Publication type:
- Article
Secure and reliable electronic record management system using digital forensic technologies.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 149, doi. 10.1007/s11227-014-1137-6
- By:
- Publication type:
- Article
Secure and efficient high-performance PROOF-based cluster system for high-energy physics.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 166, doi. 10.1007/s11227-014-1146-5
- By:
- Publication type:
- Article
Detection and analysis of secure intelligent universal designated verifier signature scheme for electronic voting system.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 177, doi. 10.1007/s11227-014-1149-2
- By:
- Publication type:
- Article
Updating the trusted connection of re-organized computing resource under the automated system management platform.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 200, doi. 10.1007/s11227-014-1158-1
- By:
- Publication type:
- Article
A study on security strategy in ICT convergence environment.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 211, doi. 10.1007/s11227-014-1194-x
- By:
- Publication type:
- Article
An efficient password-based three-party authenticated multiple key exchange protocol for wireless mobile networks.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 224, doi. 10.1007/s11227-014-1198-6
- By:
- Publication type:
- Article
Converting random bits into random numbers.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 236, doi. 10.1007/s11227-014-1202-1
- By:
- Publication type:
- Article
Microarchitectural performance comparison of Intel Knights Corner and Intel Sandy Bridge with CFD applications.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 321, doi. 10.1007/s11227-014-1245-3
- By:
- Publication type:
- Article
Performance scalability and energy consumption on distributed and many-core platforms.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 349, doi. 10.1007/s11227-014-1248-0
- By:
- Publication type:
- Article
Distributed generic approximate sparse inverses.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 365, doi. 10.1007/s11227-014-1249-z
- By:
- Publication type:
- Article
Probabilistic odd-even: an adaptive wormhole routing algorithm for 2D mesh network-on-chip.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 385, doi. 10.1007/s11227-014-1250-6
- By:
- Publication type:
- Article
Cloud computing in e-Science: research challenges and opportunities.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 408, doi. 10.1007/s11227-014-1251-5
- By:
- Publication type:
- Article
Visible watermarking with reversibility of multimedia images for ownership declarations.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 247, doi. 10.1007/s11227-014-1258-y
- By:
- Publication type:
- Article
A comparative simulation study on the power-performance of multi-core architecture.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 465, doi. 10.1007/s11227-014-1263-1
- By:
- Publication type:
- Article
Exploiting controlled-grained parallelism in message-driven stream programs.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 488, doi. 10.1007/s11227-014-1264-0
- By:
- Publication type:
- Article
Improved deleted file recovery technique for Ext2/3 filesystem.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 20, doi. 10.1007/s11227-014-1282-y
- By:
- Publication type:
- Article
Secure component composition with modular behavioral properties.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 3, doi. 10.1007/s11227-014-1283-x
- By:
- Publication type:
- Article
Editorial of special section on Hybrid Information Security Technologies: part II.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
StoryCube: supporting children's storytelling with a tangible tool.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 269, doi. 10.1007/s11227-012-0855-x
- By:
- Publication type:
- Article
High performance data clustering: a comparative analysis of performance for GPU, RASC, MPI, and OpenMP implementations.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 284, doi. 10.1007/s11227-013-0906-y
- By:
- Publication type:
- Article
Modeling computational limitations in H-Phy and Overlay-NoC architectures.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 301, doi. 10.1007/s11227-013-0932-9
- By:
- Publication type:
- Article
An anonymous e-rental protocol based on ID-based cryptography and NFC.
- Published in:
- Journal of Supercomputing, 2014, v. 70, n. 1, p. 31, doi. 10.1007/s11227-013-1051-3
- By:
- Publication type:
- Article