Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Terceros")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 69

  • Page / 3
Export

Selection :

  • and

Web Annotation as a First-Class ObjectCICCARESE, Paolo; SOILAND-REYES, Stian; CLARK, Tim et al.IEEE internet computing. 2013, Vol 17, Num 6, pp 71-75, issn 1089-7801, 5 p.Article

Multi-party quantum private comparison protocol with n-level entangled statesWANG, Qing-Le; SUN, Hong-Xiang; WEI HUANG et al.Quantum information processing (Print). 2014, Vol 13, Num 11, pp 2375-2389, issn 1570-0755, 15 p.Article

A Web 2.0 Citizen-Centric Model for T-Government ServicesDAIS, Alexandros; NIKOLAIDOU, Mara; ANAGNOSTOPOULOS, Dimosthenis et al.IEEE intelligent systems. 2013, Vol 28, Num 5, pp 10-18, issn 1541-1672, 9 p.Article

Le palimpseste de la psyché ou l'effacement de l'objet comme paradigme de la tiercéité = The palimpsest of the psyche or the erasure of the object as a paradigm of thirdnessREID, Wilfrid.Revue française de psychanalyse (Paris). 2012, Vol 76, Num 5, issn 0035-2942, 1595-1601, 1745, 1756, 1768, 1779, 1790 [12 p.]Article

An efficacious method for detecting phishing webpages through target domain identificationRAMESH, Gowtham; KRISHNAMURTHI, Ilango; SAMPATH SREE KUMAR, K et al.Decision support systems. 2014, Vol 61, pp 12-22, issn 0167-9236, 11 p.Article

Modeling and Validating E-Commerce Business Process Based on Petri NetsWANGYANG YU; CHUNGANG YAN; ZHIJUN DING et al.IEEE transactions on systems, man, and cybernetics. Systems (Print). 2014, Vol 44, Num 3, pp 327-341, issn 2168-2216, 15 p.Article

TaintDroid: An Information Flow Tracking System for Real-Time Privacy Monitoring on SmartphonesENCK, William; GILBERT, Peter; CHUN, Byung-Gon et al.Communications of the ACM. 2014, Vol 57, Num 3, pp 99-106, issn 0001-0782, 8 p.Article

Identity authentication by entanglement swapping in controlled quantum teleportation : INTELLIGENT TECHNOLOGIES FOR FUTURE INFORMATION NETWORK SYSTEMSXIAOQING TAN; LIANXIA JIANG.International journal of embedded systems (Print). 2014, Vol 6, Num 1, pp 3-13, issn 1741-1068, 11 p.Article

Access Control Protocol Based on Privacy Property of Patient in m-Healthcare EmergencyJEONG, Yoon-Su; LEE, Sang-Ho; SHIN, Seung-Soo et al.Wireless personal communications. 2014, Vol 79, Num 4, pp 2565-2578, issn 0929-6212, 14 p.Article

A robust zero-watermarking scheme using Canny edge detectorSHAKERI, Mahsa; JAMZAD, Mansour.International journal of electronic security and digital forensics (Print). 2013, Vol 5, Num 1, pp 25-44, issn 1751-911X, 20 p.Article

Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third partyZHANG, Wei-Wei; ZHANG, Ke-Jia.Quantum information processing (Print). 2013, Vol 12, Num 5, pp 1981-1990, issn 1570-0755, 10 p.Article

Bidirectional controlled quantum teleportation and secure direct communication using five-qubit entangled stateLI, Yuan-Hua; LI, Xiao-Ian; SANG, Ming-Huang et al.Quantum information processing (Print). 2013, Vol 12, Num 12, pp 3835-3844, issn 1570-0755, 10 p.Article

Multi-agent based middleware for protecting privacy in IPTV content recommender servicesELMISERY, Ahmed M; BOTVICH, Dmitri.Multimedia tools and applications. 2013, Vol 64, Num 2, pp 249-275, issn 1380-7501, 27 p.Article

Anonymity and closely related terms in the cyberspace: An analysis by example : Identity Protection and ManagementKAMBOURAKIS, Georgios.Journal of information security and applications. 2014, Vol 19, Num 1, pp 2-17, 16 p.Article

The quantum cryptographic switchSRINATHA, N; OMKAR, S; SRIKANTH, R et al.Quantum information processing (Print). 2014, Vol 13, Num 1, pp 59-70, issn 1570-0755, 12 p.Article

Efficient and feasible quantum private comparison of equality against the collective amplitude damping noiseCHEN, Xiu-Bo; YUAN SU; NIU, Xin-Xin et al.Quantum information processing (Print). 2014, Vol 13, Num 1, pp 101-112, issn 1570-0755, 12 p.Article

Haggle: Opportunistic mobile content sharing using searchNORDSTRÖM, Erik; ROHNER, Christian; GUNNINGBERG, Per et al.Computer communications. 2014, Vol 48, pp 121-132, issn 0140-3664, 12 p.Article

Independent verification of proxy multi-signature schemeHE DU; JIAN WANG; LIU, Ya-Nan et al.International journal of computational science and engineering (Print). 2014, Vol 9, Num 4, pp 301-311, issn 1742-7185, 11 p.Article

A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash functionWEI REN; YULIANG LIU.International journal of computational science and engineering (Print). 2014, Vol 9, Num 4, pp 339-346, issn 1742-7185, 8 p.Article

Relative performance of liability rules: experimental evidenceANGELOVA, Vera; ARMANTIER, Olivier; ATTANASI, Giuseppe et al.Theory and decision. 2014, Vol 77, Num 4, pp 531-556, issn 0040-5833, 26 p.Conference Paper

Peer-to-Peer Content Sharing Based on Social Identities and RelationshipsBELLAVISTA, Paolo; GIANNELLI, Carlo; IANNARIO, Luca et al.IEEE internet computing. 2014, Vol 18, Num 3, pp 55-63, issn 1089-7801, 9 p.Article

Privacy-preserving authentication of trees and graphsKUNDU, Ashish; BERTINO, Elisa.International journal of information security (Print). 2013, Vol 12, Num 6, pp 467-494, issn 1615-5262, 28 p.Article

Adaptive Web Services Monitoring in Cloud EnvironmentsYI WEI; BRIAN BLAKE, M.International journal of web portals (Print). 2013, Vol 5, Num 1, pp 15-27, issn 1938-0194, 13 p.Article

Short blind signaturesBLAZY, Olivier; FUCHSBAUER, Georg; POINTCHEVAL, David et al.Journal of computer security. 2013, Vol 21, Num 5, pp 627-661, issn 0926-227X, 35 p.Article

Efficient verifiably encrypted signatures from latticesKEE SUNG KIM; IK RAE JEONG.International journal of information security (Print). 2014, Vol 13, Num 4, pp 305-314, issn 1615-5262, 10 p.Article

  • Page / 3