-
1
-
-
84870673163
-
Isolation schemes of virtual network platform for cloud computing
-
S. Ahn, S. Lee, S. Yoo, D. Park, D. Kim, and C. Yoo Isolation schemes of virtual network platform for cloud computing KSII Trans. Internet Inform. Syst. 6 11 2012 2764 2783
-
(2012)
KSII Trans. Internet Inform. Syst.
, vol.6
, Issue.11
, pp. 2764-2783
-
-
Ahn, S.1
Lee, S.2
Yoo, S.3
Park, D.4
Kim, D.5
Yoo, C.6
-
6
-
-
79952915211
-
Security issues for cloud computing
-
K. Hamlen, M. Kantarcioglu, L. Khan, and B. Thuraisingham Security issues for cloud computing Int. J. Inform. Security Privacy 4 2 2010 39 51
-
(2010)
Int. J. Inform. Security Privacy
, vol.4
, Issue.2
, pp. 39-51
-
-
Hamlen, K.1
Kantarcioglu, M.2
Khan, L.3
Thuraisingham, B.4
-
7
-
-
84867163708
-
An extension of codes by unambiguity of languages
-
Jeng-Shyang Pan, Kebin Jia, IEEE Computer Society
-
N.D. Han, H.N. Vinh, and P.T. Huy An extension of codes by unambiguity of languages Jeng-Shyang Pan, Kebin Jia, Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing 2012 IEEE Computer Society 490 493
-
(2012)
Proceedings of the Eighth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 490-493
-
-
Han, N.D.1
Vinh, H.N.2
Huy, P.T.3
-
8
-
-
84878440582
-
Integration of wireless body area networks (wbans) and wan, wimax and lte
-
L. Hu, O.M. Dung, Q. Liu, T. Han, and Y. Sun Integration of wireless body area networks (wbans) and wan, wimax and lte KSII Trans. Internet Inform. Syst. 7 5 2013 980 997
-
(2013)
KSII Trans. Internet Inform. Syst.
, vol.7
, Issue.5
, pp. 980-997
-
-
Hu, L.1
Dung, O.M.2
Liu, Q.3
Han, T.4
Sun, Y.5
-
10
-
-
84873444280
-
An extended multi-server-based user authentication and key agreement scheme with user anonymity
-
C.-T. Li, C.-C. Lee, C.-Y. Weng, and C.-I. Fan An extended multi-server-based user authentication and key agreement scheme with user anonymity KSII Trans. Internet Inform. Syst. 7 1 2013 119 131
-
(2013)
KSII Trans. Internet Inform. Syst.
, vol.7
, Issue.1
, pp. 119-131
-
-
Li, C.-T.1
Lee, C.-C.2
Weng, C.-Y.3
Fan, C.-I.4
-
11
-
-
77649094379
-
Data security and privacy in wireless body area networks
-
M. Li, W. Lou, and K. Ren Data security and privacy in wireless body area networks IEEE Wireless Commun. 17 1 2010 51 58
-
(2010)
IEEE Wireless Commun.
, vol.17
, Issue.1
, pp. 51-58
-
-
Li, M.1
Lou, W.2
Ren, K.3
-
12
-
-
84889079354
-
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
-
Q. Liu, G. Wang, and J. Wu Time-based proxy re-encryption scheme for secure data sharing in a cloud environment Inform. Sci. 258 2014 2014 355 370
-
(2014)
Inform. Sci.
, vol.258
, Issue.2014
, pp. 355-370
-
-
Liu, Q.1
Wang, G.2
Wu, J.3
-
13
-
-
84906787984
-
Content-centric wbans for bio medical service
-
Y. Park, D. Kim, M. Jo, H.P. In, Content-centric wbans for bio medical service, in: Proceedings of the 3rd International Conference on Internet (ICONI), Korean Society for Internet Information (KSII), December 2011, pp. 155-158.
-
Proceedings of the 3rd International Conference on Internet (ICONI), Korean Society for Internet Information (KSII), December 2011
, pp. 155-158
-
-
Park, Y.1
Kim, D.2
Jo, M.3
In, H.P.4
-
14
-
-
84878447501
-
A novel wban mac protocol with improved energy consumption and data rate
-
S. Rezvani, and S.A. Ghorashi A novel wban mac protocol with improved energy consumption and data rate KSII Trans. Internet Inform. Syst. 6 9 2012 2302 2322
-
(2012)
KSII Trans. Internet Inform. Syst.
, vol.6
, Issue.9
, pp. 2302-2322
-
-
Rezvani, S.1
Ghorashi, S.A.2
-
15
-
-
79952089663
-
A study of ieee 802.15.4 security framework for wireless body area networks
-
S. Saleem, S. Ullah, and K.S. Kwak A study of ieee 802.15.4 security framework for wireless body area networks Sensors 11 2 2011 1383 1395
-
(2011)
Sensors
, vol.11
, Issue.2
, pp. 1383-1395
-
-
Saleem, S.1
Ullah, S.2
Kwak, K.S.3
-
20
-
-
84878459609
-
Power analysis attacks and countermeasures on ntru-based wireless body area networks
-
A. Wang, X. Zheng, and Z. Wang Power analysis attacks and countermeasures on ntru-based wireless body area networks KSII Trans. Internet Inform. Syst. 7 5 2013 1094 1107
-
(2013)
KSII Trans. Internet Inform. Syst.
, vol.7
, Issue.5
, pp. 1094-1107
-
-
Wang, A.1
Zheng, X.2
Wang, Z.3
-
21
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A.V. Vasilakos Security and privacy for storage and computation in cloud computing Inform. Sci. 258 2014 2014 371 386
-
(2014)
Inform. Sci.
, vol.258
, Issue.2014
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
Vasilakos, A.V.7
-
22
-
-
84878431384
-
Energy-aware management in wireless body area network system
-
X. Zhang, Y. Xia, and S. Luo Energy-aware management in wireless body area network system KSII Trans. Internet Inform. Syst. 7 5 2013 949 966
-
(2013)
KSII Trans. Internet Inform. Syst.
, vol.7
, Issue.5
, pp. 949-966
-
-
Zhang, X.1
Xia, Y.2
Luo, S.3
|