


default search action
Information Technology and Control, Volume 42
Volume 42, Number 1, 2013
- Lukás Sekanina, Richard Ruzicka, Zdenek Vasícek, Václav Simek

, Petr Hanácek
:
Implementing A Unique Chip Id On A Reconfigurable Polymorphic Circuit. 7-14 - Donatas Levisauskas, Tomas Tekorius:

An Approach To Identification Of Dynamic Model For Optimization Of Fed-Batch Fermentation Processes. 15-20 - Zuowen Tan:

An Enhanced ID-based Authenticated Multiple Key Agreement Protocol. 21-28 - Raimundas Liutkevicius, Andrius Davidsonas:

Surface Reconstruction From Partially Structured Noisy Cloud Of Points Using B-Splines. 29-37 - Uros Kac, Franc Novak:

Reconfiguration Schemes Of SC Biquad Filters For Oscillation Based Test. 38-47 - Saulius Pavalkis, Lina Nemuraite, Rita Butkiene:

Derived Properties: A User Friendly Approach To Improving Model Traceability. 48-60 - Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang:

A New Group Signature Scheme Based on RSA Assumption. 61-66 - Alireza Fatehi

, Behnaneh Sadeghpour, Batool Labibi:
Nonlinear System Identification in Frequent and Infrequent Operating Points for Nonlinear Model Predictive Control. 67-76 - Iztok Fister Jr.

, Tomaz Kosar, Iztok Fister, Marjan Mernik:
Easytime++: A Case Study Of Incremental Domain-Specific Language Development. 77-85 - Pedro J. García-Laencina:

Improving Predictions Using Linear Combination Of Multiple Extreme Learning Machines. 86-93
Volume 42, Number 2, 2013
- Debiao He

, Ding Wang, Shuhua Wu:
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards. 105-112 - Qi Jiang, Jianfeng Ma, Guangsong Li, Zhuo Ma:

An Improved Password-Based Remote User Authentication Protocol without Smart Cards. 113-123 - Wen-Chung Kuo, Bae-Ling Chen, Lih-Chyau Wuu:

Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy. 124-130 - Sarunas Packevicius, Greta Krivickaite, Dominykas Barisas, Robertas Jasaitis, Tomas Blazauskas

, Evaldas Guogis:
Test Data Generation for Complex Data Types Using Imprecise Model Constraints and Constraint Solving Techniques. 131-149 - Tomas Skersys

, Rimantas Butleris
, Kestutis Kapocius, Tomas Vileiniskis:
An Approach for Extracting Business Vocabularies from Business Process Models. 150-158 - Yuh-Min Tseng, Tung-Tso Tsai, Tsu-Yang Wu

:
Efficient Revocable Multi-Receiver ID-Based Encryption. 159-169 - Cheng-Yu Yeh, Kuan-Lin Chen, Shaw-Hwa Hwang:

Consistency Analysis of the Duration Parameter Within a Syllable for Mandarin Speech. 170-177 - Stefan Miskovic, Zorica Stanimirovic

:
A Memetic Algorithm for Solving Two Variants of the Two-Stage Uncapacitated Facility Location Problem. 178-190 - Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin:

A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices. 191-204
Volume 42, Number 3, 2013
- Andrius Blazinskas, Antanas Lenkevicius, Alfonsas Misevicius

:
Modified Local Search Heuristics for the Symmetric Traveling Salesman Problem. 217-230 - Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang:

Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification. 231-237 - Darius Birvinskas, Vacius Jusas

, Ignas Martisius, Robertas Damasevicius:
Data compression of EEG signals for artificial neural network classification. 238-241 - Saralees Nadarajah, Jungsoo Woo:

On the maximum and minimum of multivariate Pareto random variables. 242-246 - Cheng-Chi Lee

, Yan-Ming Lai, Chin-Ling Chen, Lung Albert Chen:
A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing. 247-252 - Ruslan Pacevic

, Darius Markauskas
, Lukas Radvilavicius, Arnas Kaceniauskas
, Remigijus Kutas:
Cell Attribute-Based Algorithm for Crack Visualization. 253-259 - Algimantas Venckauskas

, Nerijus Morkevicius
, Grigas Petraitis, Jonas Ceponis:
Covert Channel for Cluster-based File Systems Using Multiple Cover Files. 260-267 - Han-Yu Lin:

Secure Universal Designated Verifier Signature and its Variant for Privacy Protection. 268-276 - Zoran H. Peric

, Jelena Lukic, Jelena Nikolic, Dragan B. Denic:
Application of Mean-Square Approximation for Piecewise Linear Optimal Compander Design for Gaussian Source and Gaussian Mixture Model. 277-285 - Milan Sigmund

:
Statistical Analysis of Fundamental Frequency Based Features in Speech under Stress. 286-291
Volume 42, Number 4, 2013
- Aleksas Riskus, Giedrius Liutkus:

An Improved Algorithm for the Approximation of a Cubic Bezier Curve and its Application for Approximating Quadratic Bezier Curve. 303-308 - Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu:

Efficient Proxy Signature Scheme for Mobile Devices from Bilinear Pairings. 309-314 - Jen-Ho Yang, Ya-Fen Chang, Yi-Hui Chen:

An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment. 315-324 - Irma Ivanoviene, Jonas Rimas:

The Use of the Lambert Function Method for Analysis of a Control System with Delays. 325-332 - Mohammad Sabzinejad Farash

, Mahmoud Ahmadian-Attari:
An Enhanced Authenticated Key Agreement for Session Initiation Protocol. 333-342 - J. C. Galan-Hernandez, Vicente Alarcón Aquino

, Juan Manuel Ramírez-Cortés
, Oleg Starostenko:
Region-of-Interest Coding based on Fovea and Hierarchical Trees. 343-352 - Olga Kurasova

, Tomas Petkus, Ernestas Filatovas
:
Visualization of Pareto Front Points when Solving Multi-objective Optimization Problems. 353-361 - Vacius Jusas

, Tomas Neverdauskas:
Combining Software and Hardware Test Generation Methods to Verify VHDL Models. 362-368 - Chin-Ling Chen, Wei-Chen Tsai, Yu-Yi Chen, Woei-Jiunn Tsaur:

Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET. 369-379 - Nemanja Nedic, Goran Svenda

:
Workflow Management System for DMS. 380-392

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














