共 37 条
[1]
Ahn H(2015)Performance analysis of object recognition and tracking for the use of surveillance system J Ambient Intell Humaniz Comput 5 41-59
[2]
Lee YH(2015)Security framework for RESTful mobile cloud computing web services J Ambient Intell Humaniz Comput 6 87-110
[3]
AlShahwan F(2016)A secure group-based mobile chat protocol J Ambient Intell Humaniz Comput undefined undefined-undefined
[4]
Faisal M(2016)Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge J Ambient Intell Humaniz Comput undefined undefined-undefined
[5]
Ansa G(2015)Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs J Ambient Intell Humaniz Comput undefined undefined-undefined
[6]
Chen HC(2015)Multi-segment and multi-stage projected tetrahedra J Ambient Intell Humaniz Comput undefined undefined-undefined
[7]
Mao CH(2015)Pseudonymous authentication for secure V2I services in cloud-based vehicular networks J Ambient Intell Humaniz Comput undefined undefined-undefined
[8]
Lin YT(2015)CLaaS: cybersecurity lab as a service J Internet Serv Inf Secur undefined undefined-undefined
[9]
Kung TL(2015)Time series forecasting of cloud data center workloads for dynamic resource provisioning J Wirel Mob Netw Ubiquitous Comput Dependable Appl undefined undefined-undefined
[10]
Weng CE(2015)Dynamic proofs of retrievability with square-root oblivious RAM J Ambient Intell Humaniz Comput undefined undefined-undefined