The SCEAS System
Navigation Menu

Journals in DBLP

J. Inf. Sci. Eng.
2001, volume: 17, number: 6

  1. Zhi-Jia Tzeng, Wen-Guey Tzeng
    Practical and Efficient Electronic Voting Schemes. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:865-877 [Journal]
  2. Reihaneh Safavi-Naini, Willy Susilo, Huaxiong Wang
    An Efficient Construction for Fail-Stop Signature for Long Messages. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:879-898 [Journal]
  3. Yao-Tsung Lin, Shian-Shyong Tseng, Shun-Chieh Lin
    An Intrusion Detection Model Based Upon Intrusion Detection Markup Language. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:899-919 [Journal]
  4. Sejong Oh, Seog Park
    An Improved Administration Method on Role-Based Access Control in the Enterprise Environment. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:921-944 [Journal]
  5. Sang Uk Shin, Kyung Hyune Rhee
    A New Design of the Hash Functions With All-or-Nothing Property. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:945-957 [Journal]
  6. Gwoboa Horng
    A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:959-965 [Journal]
  7. Chung-Hsien Wu, Jin-Hua Hong, Cheng-Wen Wu
    VLSI Design of RSA Cryptosystem Based on the Chinese Remainder Theorem. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2001, v:17, n:6, pp:967-980 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002