


default search action
Information Sciences, Volume 321
Volume 321, November 2015
- Wenye Li:

Visualizing network communities with a semi-definite programming method. 1-13 - Enrique Onieva, Unai Hernández-Jayo

, Eneko Osaba
, Asier Perallos, Xiao Zhang
:
A multi-objective evolutionary algorithm for the tuning of fuzzy rule bases for uncoordinated intersections in autonomous driving. 14-30 - Ángel Cuenca

, Unnati Ojha, Julián Salt
, Mo-Yuen Chow:
A non-uniform multi-rate control strategy for a Markov chain-driven Networked Control System. 31-47 - Mihaela Cocea

, George D. Magoulas
:
Participatory Learner Modelling Design: A methodology for iterative learner models development. 48-70 - Kefeng Wang, Yi Mu, Willy Susilo

:
Identity-based quotable ring signature. 71-89 - Manish Aggarwal:

On learning of weights through preferences. 90-102 - Deqing Li, Wenyi Zeng, Yibin Zhao:

Note on distance measure of hesitant fuzzy sets. 103-115 - Marta Fort

, Joan Antoni Sellarès
:
Common influence region problems. 116-135 - Rafaela Osuna Gómez

, Yurilev Chalco-Cano
, Beatriz Hernández-Jiménez
, Gabriel Ruiz Garzón
:
Optimality conditions for generalized differentiable interval-valued functions. 136-146
- Shiuh-Jeng Wang, Jigang Liu, Taeshik Shon, Binod Vaidya, Yeong-Sheng Chen:

Security and privacy information technologies and applications for wireless pervasive computing environments. 147-149 - Raja Naeem Akram

, Konstantinos Markantonakis
, Damien Sauveron:
A novel consumer-centric card management architecture and potential security issues. 150-161 - Ding Wang

, Nan Wang, Ping Wang, Sihan Qing:
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. 162-178 - Mauro Andreolini

, Michele Colajanni
, Mirco Marchetti
:
A collaborative framework for intrusion detection in mobile networks. 179-192 - Patrick Shicheng Chen, Shu-Chiung Lin, Chien-Hsing Sun:

Simple and effective method for detecting abnormal internet behaviors of mobile devices. 193-204 - Ruben Rios, Jorge Cuéllar, Javier López

:
Probabilistic receiver-location privacy protection in wireless sensor networks. 205-223 - Hung-Min Sun, Bing-Zhe He, Chien-Ming Chen

, Tsu-Yang Wu
, Chia-Hsien Lin, Huaxiong Wang:
A provable authenticated group key agreement protocol for mobile environment. 224-237 - Wen-Long William Chin, Trong Nghia Le, Chun-Lin Tseng:

Authentication scheme for mobile OFDM based on security information technology of physical layer over time-variant and multipath fading channels. 238-249 - Jen-Chun Lee, Chien-Ping Chang, Wei-Kuei Chen:

Detection of copy-move image forgery using histogram of orientated gradients. 250-262 - Debiao He

, Neeraj Kumar
, Naveen K. Chilamkurti:
A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. 263-277

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














