-
1
-
-
85009412677
-
The internet of things in healthcare: an overview
-
[1] Yin, Y., Zeng, Y., Chen, X., Fan, Y., The internet of things in healthcare: an overview. J. Ind. Inf. Integ. 1 (2016), 3–13.
-
(2016)
J. Ind. Inf. Integ.
, vol.1
, pp. 3-13
-
-
Yin, Y.1
Zeng, Y.2
Chen, X.3
Fan, Y.4
-
2
-
-
85009423221
-
Internet of things in product life-cycle energy management
-
[2] Tao, F., Wang, Y., Zuo, Y., Yang, H., Zhang, M., Internet of things in product life-cycle energy management. J. Ind. Inf. Integ. 1 (2016), 26–39.
-
(2016)
J. Ind. Inf. Integ.
, vol.1
, pp. 26-39
-
-
Tao, F.1
Wang, Y.2
Zuo, Y.3
Yang, H.4
Zhang, M.5
-
3
-
-
85009350772
-
Multi-criteria selection for services selection in service workflow
-
[3] Viriyasitavat, W., Multi-criteria selection for services selection in service workflow. J. Ind. Inf. Integ. 1 (2016), 20–25.
-
(2016)
J. Ind. Inf. Integ.
, vol.1
, pp. 20-25
-
-
Viriyasitavat, W.1
-
4
-
-
85009431393
-
A multidisciplinary design and analysis environment and its application to aircraft flight dynamics analysis
-
[4] Wang, C., A multidisciplinary design and analysis environment and its application to aircraft flight dynamics analysis. J. Ind. Inf. Integ. 1 (2016), 14–19.
-
(2016)
J. Ind. Inf. Integ.
, vol.1
, pp. 14-19
-
-
Wang, C.1
-
6
-
-
84923067659
-
Cryptanalysis of an improved smartcard-based remote password authentication scheme
-
[6] Islam, S.K.H., Biswas, G.P., Choo, K.-K.R., Cryptanalysis of an improved smartcard-based remote password authentication scheme. Inf. Sci. Lett. 3:1 (2014), 35–40.
-
(2014)
Inf. Sci. Lett.
, vol.3
, Issue.1
, pp. 35-40
-
-
Islam, S.K.H.1
Biswas, G.P.2
Choo, K.-K.R.3
-
7
-
-
84891752344
-
Smart environment as a service: three factor cloud based user authentication for telecare medical information system
-
[7] Siddiqui, Z., Abdullah, A.H., Khan, M.K., Alghamdi, S., Smart environment as a service: three factor cloud based user authentication for telecare medical information system. J. Med. Syst. 38:1 (2014), 1–14.
-
(2014)
J. Med. Syst.
, vol.38
, Issue.1
, pp. 1-14
-
-
Siddiqui, Z.1
Abdullah, A.H.2
Khan, M.K.3
Alghamdi, S.4
-
8
-
-
84901706294
-
Self-updating one-time password mutual authentication protocol for ad hoc network
-
[8] Xu, F., Lv, X., Zhou, Q., Liu, X., Self-updating one-time password mutual authentication protocol for ad hoc network. KSII Trans. Int. Inf. Syst. 8:5 (2014), 1817–1827.
-
(2014)
KSII Trans. Int. Inf. Syst.
, vol.8
, Issue.5
, pp. 1817-1827
-
-
Xu, F.1
Lv, X.2
Zhou, Q.3
Liu, X.4
-
9
-
-
84939182178
-
Middleware to integrate mobile devices, sensors and cloud computing
-
[9] Vinh, T.L., Bouzefrane, S., Farinone, J.M., Attar, A., Kennedy, B.P., Middleware to integrate mobile devices, sensors and cloud computing. Procedia Computer Science 52 (2015), 234–243.
-
(2015)
Procedia Computer Science
, vol.52
, pp. 234-243
-
-
Vinh, T.L.1
Bouzefrane, S.2
Farinone, J.M.3
Attar, A.4
Kennedy, B.P.5
-
10
-
-
33749031018
-
Non-group cellular automata based one time password authentication scheme in wireless networks
-
[10] Jeon, J.C., Kim, K.W., Yoo, K.Y., Non-group cellular automata based one time password authentication scheme in wireless networks. International Workshop Secure Mobile Ad-hoc Networks and Sensors (MADNES), Singapore, 2006, 110–116.
-
(2006)
International Workshop Secure Mobile Ad-hoc Networks and Sensors (MADNES), Singapore
, pp. 110-116
-
-
Jeon, J.C.1
Kim, K.W.2
Yoo, K.Y.3
-
11
-
-
84871112351
-
Trusted platform for support services in cloud computing environment
-
[11] Kolhe, S., Dhage, S., Trusted platform for support services in cloud computing environment. International Conference of System Engineering and Technology (ICSET), Bandung, 2012, 1–6.
-
(2012)
International Conference of System Engineering and Technology (ICSET), Bandung
, pp. 1-6
-
-
Kolhe, S.1
Dhage, S.2
-
12
-
-
84875990691
-
Cloud computing security issues and challenges
-
[12] Kuyoro, S.O., Ibikunle, F., Awodele, O., Cloud computing security issues and challenges. Int. J. Comput. Netw. 3:5 (2011), 247–255.
-
(2011)
Int. J. Comput. Netw.
, vol.3
, Issue.5
, pp. 247-255
-
-
Kuyoro, S.O.1
Ibikunle, F.2
Awodele, O.3
-
13
-
-
85018551435
-
Chapter 16: Authentication in Distributed System, Distributed Computing: Principles, Algorithms and Systems
-
Cambridge University Press
-
[13] Kshemkalyani, A., Singhal, M., Chapter 16: Authentication in Distributed System, Distributed Computing: Principles, Algorithms and Systems. 2011, Cambridge University Press, 598–628.
-
(2011)
, pp. 598-628
-
-
Kshemkalyani, A.1
Singhal, M.2
-
14
-
-
0033877687
-
An ASIC for cellular automata based message authentication
-
[14] Dasgupta, P., Chattopadhyay, S., Sengupta, I., An ASIC for cellular automata based message authentication. VLSI Design Conference, Calcutta, India, 1999, 538–541.
-
(1999)
VLSI Design Conference, Calcutta, India
, pp. 538-541
-
-
Dasgupta, P.1
Chattopadhyay, S.2
Sengupta, I.3
-
15
-
-
84889053771
-
Secure smartphone-based registration and key deployment for vehicle-to-cloud communications
-
[15] Timpner, J., Schürmann, D., Wolf, L., Secure smartphone-based registration and key deployment for vehicle-to-cloud communications. ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles, 2013, 31–36.
-
(2013)
ACM Workshop on Security, Privacy & Dependability for Cyber Vehicles
, pp. 31-36
-
-
Timpner, J.1
Schürmann, D.2
Wolf, L.3
-
16
-
-
84889076863
-
Authenticated storage using small trusted hardware
-
[16] Yang, H.J., Costan, V., Zeldovich, N., Devadas, S., Authenticated storage using small trusted hardware. ACM Workshop Cloud Computing Security, 2013, 35–46.
-
(2013)
ACM Workshop Cloud Computing Security
, pp. 35-46
-
-
Yang, H.J.1
Costan, V.2
Zeldovich, N.3
Devadas, S.4
-
17
-
-
84872696068
-
Privacy preserving data sharing with anonymous id assignment
-
[17] Dunning, L.A., Kresman, R., Privacy preserving data sharing with anonymous id assignment. IEEE Trans. Inf. Forensic. Sec. 8:2 (2013), 402–413.
-
(2013)
IEEE Trans. Inf. Forensic. Sec.
, vol.8
, Issue.2
, pp. 402-413
-
-
Dunning, L.A.1
Kresman, R.2
-
18
-
-
33750227651
-
Authentication based on singular cellular automata
-
[18] Jeon, J.-C., Yoo, K-Y., Authentication based on singular cellular automata. Lect. Notes Comp. Science 4173 (2006), 605–610.
-
(2006)
Lect. Notes Comp. Science
, vol.4173
, pp. 605-610
-
-
Jeon, J.-C.1
Yoo, K.-Y.2
-
19
-
-
84887389506
-
Survey on security issues in cloud computing and associated mitigation techniques
-
[19] Bhadauria, R., Sanyal, S., Survey on security issues in cloud computing and associated mitigation techniques. Int. J. Comput. Appl. 47:18 (2012), 47–66.
-
(2012)
Int. J. Comput. Appl.
, vol.47
, Issue.18
, pp. 47-66
-
-
Bhadauria, R.1
Sanyal, S.2
-
21
-
-
0347140620
-
Linear cellular automata with boundary conditions
-
[21] Chin, W., Cortzen, B., Goldman, J., Linear cellular automata with boundary conditions. Linear Algebra Appl. 322:1 (2001), 193–206.
-
(2001)
Linear Algebra Appl.
, vol.322
, Issue.1
, pp. 193-206
-
-
Chin, W.1
Cortzen, B.2
Goldman, J.3
-
22
-
-
0003818882
-
Additive Cellular Automata: Theory and Applications
-
IEEE Computer Society Press USA
-
[22] Chaudhuri, P.P., Chowdhury, D.R., Nandi, S., Chattopadhyay, S., Additive Cellular Automata: Theory and Applications. 1997, IEEE Computer Society Press, USA, 1.
-
(1997)
, pp. 1
-
-
Chaudhuri, P.P.1
Chowdhury, D.R.2
Nandi, S.3
Chattopadhyay, S.4
-
23
-
-
84908571173
-
Energy-aware scheduling of distributed systems
-
[23] Agrawal, P., Rao, S., Energy-aware scheduling of distributed systems. IEEE Trans. Autom. Sci. Eng. 11:4 (2014), 1163–1175.
-
(2014)
IEEE Trans. Autom. Sci. Eng.
, vol.11
, Issue.4
, pp. 1163-1175
-
-
Agrawal, P.1
Rao, S.2
-
24
-
-
84990637885
-
PVM: a framework for parallel distributed computing
-
[24] Sunderam, V.S., PVM: a framework for parallel distributed computing. Concurrency 2:4 (1990), 315–339.
-
(1990)
Concurrency
, vol.2
, Issue.4
, pp. 315-339
-
-
Sunderam, V.S.1
-
25
-
-
0036807835
-
Sequential and parallel cellular automata-based scheduling algorithms
-
[25] Seredynski, F., Zomaya, A.Y., Sequential and parallel cellular automata-based scheduling algorithms. IEEE Trans. Parallel Distrib. Syst. 13:10 (2002), 1009–1023.
-
(2002)
IEEE Trans. Parallel Distrib. Syst.
, vol.13
, Issue.10
, pp. 1009-1023
-
-
Seredynski, F.1
Zomaya, A.Y.2
-
26
-
-
0029307833
-
A parallel cellular automata environment on multicomputers for computational science
-
[26] Cannataro, M., Di Gregorio, S., Rongo, R., Spataro, W., Spezzano, G., Talia, D., A parallel cellular automata environment on multicomputers for computational science. Parallel Comput. 21:5 (1995), 803–823.
-
(1995)
Parallel Comput.
, vol.21
, Issue.5
, pp. 803-823
-
-
Cannataro, M.1
Di Gregorio, S.2
Rongo, R.3
Spataro, W.4
Spezzano, G.5
Talia, D.6
-
27
-
-
0035312642
-
Cellular Automata: from a theoretical parallel computational model to its application to complex systems
-
[27] Bandini, S., mauri, G., Serra, R., Cellular Automata: from a theoretical parallel computational model to its application to complex systems. Parallel Comput. 27:5 (2001), 539–553.
-
(2001)
Parallel Comput.
, vol.27
, Issue.5
, pp. 539-553
-
-
Bandini, S.1
mauri, G.2
Serra, R.3
-
28
-
-
0028750092
-
Theory and application of cellular automata in cryptography
-
1346–135
-
[28] Nandi, S., Kar, B.K., Chaudhuri, P.P., Theory and application of cellular automata in cryptography. IEEE Trans. Comput., 43(12), 1994 1346–135.
-
(1994)
IEEE Trans. Comput.
, vol.43
, Issue.12
-
-
Nandi, S.1
Kar, B.K.2
Chaudhuri, P.P.3
-
29
-
-
80053156581
-
Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network
-
[29] Jamil, N., Ramlan, M., Cellular automata based user authentication scheme using identity-bits commitment for Wireless Sensor Network. IEEE 3rd International Conference Communication Software and Networks (ICCSN-2011), Xi'an, May 27-29, 2011, 388–391.
-
(2011)
IEEE 3rd International Conference Communication Software and Networks (ICCSN-2011), Xi'an, May 27-29
, pp. 388-391
-
-
Jamil, N.1
Ramlan, M.2
-
30
-
-
84867557917
-
Cellular automata based authentication (CAA)
-
[30] Mukherjee, M., Ganguly, N., Chaudhuri, P.P., Cellular automata based authentication (CAA). Lect. Notes Comp. Science 2493 (2002), 259–269.
-
(2002)
Lect. Notes Comp. Science
, vol.2493
, pp. 259-269
-
-
Mukherjee, M.1
Ganguly, N.2
Chaudhuri, P.P.3
-
31
-
-
84958540049
-
Password protected visual cryptography via cellular automaton rule 30, Tran. Data Hiding and Multimedia Security IX
-
[31] Yampolskiy, R.V., Rebolledo-Mendez, J.D., Hindi, M.M., Password protected visual cryptography via cellular automaton rule 30, Tran. Data Hiding and Multimedia Security IX. Lect. Notes Comp. Science 8363 (2014), 57–67.
-
(2014)
Lect. Notes Comp. Science
, vol.8363
, pp. 57-67
-
-
Yampolskiy, R.V.1
Rebolledo-Mendez, J.D.2
Hindi, M.M.3
-
32
-
-
78349249779
-
Theory and application of equal length cycle cellular automata (ELCCA) for enzyme classification
-
[32] Ghosh, S., Bacchar, T., Maiti, N.S., Mitra, I., Chaudhuri, P.P., Theory and application of equal length cycle cellular automata (ELCCA) for enzyme classification. Lect. Notes Comp. Science 6350 (2010), 46–57.
-
(2010)
Lect. Notes Comp. Science
, vol.6350
, pp. 46-57
-
-
Ghosh, S.1
Bacchar, T.2
Maiti, N.S.3
Mitra, I.4
Chaudhuri, P.P.5
-
33
-
-
84923261455
-
An analysis of equal length cellular automata (ELCA) generating linear rules for applications in distributed computing
-
[33] Mitra, A., Kundu, A., Chattopadhyay, M., Chattopadhyay, S., An analysis of equal length cellular automata (ELCA) generating linear rules for applications in distributed computing. J. Cellular Automata 10:1-2 (2015), 95–117.
-
(2015)
J. Cellular Automata
, vol.10
, Issue.1-2
, pp. 95-117
-
-
Mitra, A.1
Kundu, A.2
Chattopadhyay, M.3
Chattopadhyay, S.4
-
34
-
-
78349288381
-
Towards generalized measures grasping CA dynamics
-
Sep. 21-24
-
[34] Baetens, J.M., Baets, B.D., Towards generalized measures grasping CA dynamics. 9th International Conference Cellular Automata for Research and Industry (ACRI 2010), Italy, 2010, 177–187 Sep. 21-24.
-
(2010)
9th International Conference Cellular Automata for Research and Industry (ACRI 2010), Italy
, pp. 177-187
-
-
Baetens, J.M.1
Baets, B.D.2
-
35
-
-
84923245704
-
Random number generators: performance comparison of ELCA and MaxCA
-
[35] Mitra, A., Kundu, A., Das, C., Random number generators: performance comparison of ELCA and MaxCA. CSI Trans. ICT 2:2 (2014), 117–127.
-
(2014)
CSI Trans. ICT
, vol.2
, Issue.2
, pp. 117-127
-
-
Mitra, A.1
Kundu, A.2
Das, C.3
-
36
-
-
85018605271
-
DIMACS-Series in discrete mathematica and theoretical computer science, 15(1992), Computational Support for discrete mathematics, DIMACS Workshop
-
American Mathematical Society
-
[36] Dean, N., Shannon, G.E., DIMACS-Series in discrete mathematica and theoretical computer science, 15(1992), Computational Support for discrete mathematics, DIMACS Workshop. 1992, American Mathematical Society.
-
(1992)
-
-
Dean, N.1
Shannon, G.E.2
-
37
-
-
85018616350
-
Discrete Mathematics, Lecture Notes
-
Yale University (accessed 06.04.2016).
-
[37] Lov ́sz, L., Vesztergombi, K., Discrete Mathematics, Lecture Notes. 1999, Yale University, 4–139 http://www.cims.nyu.edu/∼regev/teaching/discrete_math_fall_2005/dmbook.pdf (accessed 06.04.2016).
-
(1999)
, pp. 4-139
-
-
Lov ́sz, L.1
Vesztergombi, K.2
-
38
-
-
85018561659
-
On gardens of eden of elementary cellular automata
-
[38] Barrett, C.L., Chen, W.Y.C., Reiyds, C.M., On gardens of eden of elementary cellular automata. International Conference Discrete Models (Combinatories, Computation & Geometry), Paris, 2001, 1–9.
-
(2001)
International Conference Discrete Models (Combinatories, Computation & Geometry), Paris
, pp. 1-9
-
-
Barrett, C.L.1
Chen, W.Y.C.2
Reiyds, C.M.3
-
40
-
-
77951239906
-
Secure and testable scan design using extended de bruijn graphs
-
[40] Fujiwara, H., Obein, M.E.J., Secure and testable scan design using extended de bruijn graphs. Asia South Pacific Design Automation Conf. (ASP-DAC), Taiwan, 2010, 413–418.
-
(2010)
Asia South Pacific Design Automation Conf. (ASP-DAC), Taiwan
, pp. 413-418
-
-
Fujiwara, H.1
Obein, M.E.J.2
-
41
-
-
0002757715
-
De bruijn graphs and linear cellular automata
-
[41] Sutner, K., De bruijn graphs and linear cellular automata. Complex Systems 5:1 (1991), 19–30.
-
(1991)
Complex Systems
, vol.5
, Issue.1
, pp. 19-30
-
-
Sutner, K.1
-
42
-
-
85018569773
-
Cryptosystems based on reversible cellular automata
-
(accessed April 2015)
-
[42] Kari, J., Cryptosystems based on reversible cellular automata. Manuscript, 1992, 1–10 http://users.utu.fi/jkari/CACryptoScanned.pdf (accessed April 2015).
-
(1992)
Manuscript
, pp. 1-10
-
-
Kari, J.1
-
43
-
-
84921681405
-
Theory of additive cellular automata
-
[43] Ganguly, N., Sikdar, B.K., Chaudhuri, P.P., Theory of additive cellular automata. Fundamenta Informaticae XXI (2001), 1001–1021.
-
(2001)
Fundamenta Informaticae
, vol.21
, pp. 1001-1021
-
-
Ganguly, N.1
Sikdar, B.K.2
Chaudhuri, P.P.3
-
44
-
-
85018543437
-
Dynamics computation of equal length cellular automata (ELCA) rules; 5th International Conference Electronics Engineering & Computer Science (IEMCON)
-
[44] Mitra, A., Kundu, A., Chattopadhyay, M., Chattopadhyay, S., Dynamics computation of equal length cellular automata (ELCA) rules; 5th International Conference Electronics Engineering & Computer Science (IEMCON). India, 2014, 214–220.
-
(2014)
India
, pp. 214-220
-
-
Mitra, A.1
Kundu, A.2
Chattopadhyay, M.3
Chattopadhyay, S.4
-
45
-
-
45149138762
-
Computation at the age of chaos: phase transitions and emergent computation
-
[45] Langton, C.G., Computation at the age of chaos: phase transitions and emergent computation. Physica D 42 (1990), 12–37.
-
(1990)
Physica D
, vol.42
, pp. 12-37
-
-
Langton, C.G.1
-
49
-
-
85018586313
-
“Lattice Isomorphism” from mathworld–a wolfram web resource
-
created by E.W. Weisstein (accessed April 2016).
-
[49] created byInsall, M., “Lattice Isomorphism” from mathworld–a wolfram web resource. Weisstein, E.W., (eds.), 2016 (accessed April 2016).
-
(2016)
-
-
Insall, M.1
-
50
-
-
20344387426
-
A survey on cellular automata
-
(accessed April 2016)
-
[50] Ganguly, N., Sikdar, B.K., Deutsch, A., Canright, G., Chaudhuri, P.P., A survey on cellular automata. http://www.cs.unibo.it/bison/publications/CAsurvey.pdf, 2003 (accessed April 2016).
-
(2003)
-
-
Ganguly, N.1
Sikdar, B.K.2
Deutsch, A.3
Canright, G.4
Chaudhuri, P.P.5
-
51
-
-
85018554516
-
-
(accessed April)
-
[51] http://cims.nyu.edu/∼kiryl/Algebra/Section_3.10–Polynomials_Over_The_Rational_Field.pdf (accessed April 2016).
-
(2016)
-
-
-
52
-
-
84968496807
-
On the use of reducible polynomials as random number generators
-
[52] Wang, D.K., Compagner, A., On the use of reducible polynomials as random number generators. Math. Comput. 60:201 (1993), 363–374.
-
(1993)
Math. Comput.
, vol.60
, Issue.201
, pp. 363-374
-
-
Wang, D.K.1
Compagner, A.2
-
53
-
-
84892941211
-
Sub-computable bounded pseudorandomness, logical foundations of computer science
-
[53] Cenzer, D., Remmel, J.B., Sub-computable bounded pseudorandomness, logical foundations of computer science. Lect. Notes Comp. Science 7734 (2013), 104–118.
-
(2013)
Lect. Notes Comp. Science
, vol.7734
, pp. 104-118
-
-
Cenzer, D.1
Remmel, J.B.2
-
54
-
-
0001025898
-
The structure of the elementary cellular automata rule space
-
[54] Li, W., Packard, N., The structure of the elementary cellular automata rule space. Complex Systems 4 (1990), 281–297.
-
(1990)
Complex Systems
, vol.4
, pp. 281-297
-
-
Li, W.1
Packard, N.2
-
55
-
-
84893328361
-
Neuroscience meets cryptography: designing crypto primitives secure against rubber hose attacks
-
[55] Bojinov, H., Sanchez, D., Reber, P., Boneh, D., P. Linclon, P., Neuroscience meets cryptography: designing crypto primitives secure against rubber hose attacks. USENIX Security Symposium, Bellevue, WA, 2012, 129–141.
-
(2012)
USENIX Security Symposium, Bellevue, WA
, pp. 129-141
-
-
Bojinov, H.1
Sanchez, D.2
Reber, P.3
Boneh, D.4
Linclon, P.5
-
56
-
-
85018616166
-
-
(accessed July)
-
[56] http://global.britannica.com/EBchecked/topic/603174/transposition-cipher (accessed July 2015).
-
(2015)
-
-
-
57
-
-
85018584357
-
-
(accessed April)
-
[57] http://www.math.lsa.umich.edu/∼speyer/417/InjectiveSurjective.pdf (accessed April 2016).
-
(2016)
-
-
-
58
-
-
84921403935
-
RankSign: an efficient signature algorithm based on the rank metric
-
[58] Gaborit, P., Ruatta, O., Schrek, J., Zémor, G., RankSign: an efficient signature algorithm based on the rank metric. International Workshop Post-Quantum Cryptography, 2014, 88–107.
-
(2014)
International Workshop Post-Quantum Cryptography
, pp. 88-107
-
-
Gaborit, P.1
Ruatta, O.2
Schrek, J.3
Zémor, G.4
-
60
-
-
85018534255
-
-
[60] Test for randomness: the runs' test. https://home.ubalt.edu/ntsbarsh/business-stat/opre504.htm#rrunstest (accessed November 2016).
-
(2016)
Test for randomness: the runs' test
-
-
|