Found: 10
Select item for more details and to access through your institution.
Secure Convertible Undeniable Signature Scheme Using Extended Euclidean Algorithm without Random Oracles.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 6, p. 1512, doi. 10.3837/tiis.2013.06.010
- By:
- Publication type:
- Article
An Image Encryption Scheme Based on Concatenated Torus Automorphisms.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 6, p. 1492, doi. 10.3837/tiis.2013.06.009
- By:
- Publication type:
- Article
Certificate-Based Encryption Scheme without Pairing.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 6, p. 1480, doi. 10.3837/tiis.2013.06.008
- By:
- Publication type:
- Article
An Unequal Protection FEC Scheme for Video over Optical Access Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 6, p. 1463, doi. 10.3837/tiis.2013.06.007
- By:
- Publication type:
- Article
Simpson Style Caricature based on MLS.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 6, p. 1449, doi. 10.3837/tiis.2013.06.006
- By:
- Publication type:
- Article
Virtual Reality to Help Relieve Travel Anxiety.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 6, p. 1433, doi. 10.3837/tiis.2013.06.005
- By:
- Publication type:
- Article
Secure Beamforming with Artificial Noise for Two-way Relay Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 6, p. 1418, doi. 10.3837/tiis.2013.06.004
- By:
- Publication type:
- Article
A Resource Reduction Scheme with Low Migration Frequency for Virtual Machines on a Cloud Cluster.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 6, p. 1398, doi. 10.3837/tiis.2013.06.003
- By:
- Publication type:
- Article
Joint Beamforming and Power Allocation for Multiple Primary Users and Secondary Users in Cognitive MIMO Systems via Game Theory.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 6, p. 1379, doi. 10.3837/tiis.2013.06.002
- By:
- Publication type:
- Article
An Energy Efficient Chain-based Routing Protocol for Wireless Sensor Networks.
- Published in:
- KSII Transactions on Internet & Information Systems, 2013, v. 7, n. 6, p. 1357, doi. 10.3837/tiis.2013.06.001
- By:
- Publication type:
- Article