| International Journal of Electronics and Information Engineering | ||
![]() |
||
| 1. | On the Security Analysis of Protocols Using Action Language
|
|
| Suvansh Lal, Manik Lal Das, Vol. 2, No. 1, 2015, pp. 1-9 Article Full Text PDF .bib |
||
| 2. | An Attribute Based Key Agreement Protocol Resilient to KCI Attack
|
|
| Majid Bayat, MohammadReza Aref, Vol. 2, No. 1, 2015, pp. 10-20 Article Full Text PDF .bib |
||
| 3. | MMOPRG Bot Detection Based on Traffic Analysis
|
|
| Ye Zhu, Yuanchao Lu, Matthew Itomlenskis, Seetharamayya Vyaghri, Huirong Fu, Vol. 2, No. 1, 2015, pp. 21-31 Article Full Text PDF .bib |
||
| 4. | Learning to Dialogue in Identifying User's Interest by Partial Observable Markov Decision Process
|
|
| Oscar Li Jen Hsu, Von-Wun Soo, Vol. 2, No. 1, 2015, pp. 32-46 Article Full Text PDF .bib |
||
| 5. | A Multi-secret Sharing Scheme Based on the CRT and RSA
|
|
| Xuedong Dong, Vol. 2, No. 1, 2015, pp. 47-51 Article Full Text PDF .bib |
||
| 6. | Reviewer index to volume 2 (2015)
|
|