Period of time: 2015年4期
Publisher: MDPI
Founded in: 2010
Total resources: 30
E-ISSN: 2078-2489|6|4
ISSN: 2078-2489
Subject: TP3 Computers
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Information,volume 6,issue 4
Menu
A Backward Unlinkable Secret Handshake Scheme with Revocation Support in the Standard Model
By Wen Yamin,Gong Zheng,Xu Lingling in (2015)
Information,volume 6,issue 4 , Vol. 6, Iss. 4, 2015-10 , pp.Duplication Detection When Evolving Feature Models of Software Product Lines
By Khtira Amal,Benlarabi Anissa,El Asri Bouchra in (2015)
Information,volume 6,issue 4 , Vol. 6, Iss. 4, 2015-10 , pp.Analysis of Two-Worm Interaction Model in Heterogeneous M2M Network
By Ma Jinhua,Chen Zhide,Liu Jianghua,Zheng Rongjun in (2015)
Information,volume 6,issue 4 , Vol. 6, Iss. 4, 2015-10 , pp.By Jia Pengfei,Duan Shukai,Yan Jia in (2015)
Information,volume 6,issue 4 , Vol. 6, Iss. 4, 2015-10 , pp.Bayesian Angular Superresolution Algorithm for Real-Aperture Imaging in Forward-Looking Radar
By Zha Yuebo,Zhang Yin,Huang Yulin,Yang Jianyu in (2015)
Information,volume 6,issue 4 , Vol. 6, Iss. 4, 2015-10 , pp.By Silkan Hassan,Hanyf Youssef in (2015)
Information,volume 6,issue 4 , Vol. 6, Iss. 4, 2015-10 , pp.The Development of Philosophy and Its Fundamental Informational Turn
Information,volume 6,issue 4 , Vol. 6, Iss. 4, 2015-10 , pp.Batch Attribute-Based Encryption for Secure Clouds
By Yang Chen,Sun Yang,Wu Qianhong in (2015)
Information,volume 6,issue 4 , Vol. 6, Iss. 4, 2015-10 , pp.Cable Capacitance Attack against the KLJN Secure Key Exchange
By Chen Hsien-Pu,Gonzalez Elias,Saez Yessica,Kish Laszlo B. in (2015)
Information,volume 6,issue 4 , Vol. 6, Iss. 4, 2015-10 , pp.