共 37 条
- [1] Ahn H(2015)Performance analysis of object recognition and tracking for the use of surveillance system J Ambient Intell Humaniz Comput 5 41-59
- [2] Lee YH(2015)Security framework for RESTful mobile cloud computing web services J Ambient Intell Humaniz Comput 6 87-110
- [3] AlShahwan F(2016)A secure group-based mobile chat protocol J Ambient Intell Humaniz Comput undefined undefined-undefined
- [4] Faisal M(2016)Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge J Ambient Intell Humaniz Comput undefined undefined-undefined
- [5] Ansa G(2015)Public key encryption secure against related-key attacks and key-leakage attacks from extractable hash proofs J Ambient Intell Humaniz Comput undefined undefined-undefined
- [6] Chen HC(2015)Multi-segment and multi-stage projected tetrahedra J Ambient Intell Humaniz Comput undefined undefined-undefined
- [7] Mao CH(2015)Pseudonymous authentication for secure V2I services in cloud-based vehicular networks J Ambient Intell Humaniz Comput undefined undefined-undefined
- [8] Lin YT(2015)CLaaS: cybersecurity lab as a service J Internet Serv Inf Secur undefined undefined-undefined
- [9] Kung TL(2015)Time series forecasting of cloud data center workloads for dynamic resource provisioning J Wirel Mob Netw Ubiquitous Comput Dependable Appl undefined undefined-undefined
- [10] Weng CE(2015)Dynamic proofs of retrievability with square-root oblivious RAM J Ambient Intell Humaniz Comput undefined undefined-undefined