International Journal of Electronics and Information Engineering | ||
1. | On the Security Analysis of Protocols Using Action Language
|
|
Suvansh Lal, Manik Lal Das, Vol. 2, No. 1, 2015, pp. 1-9 Article Full Text PDF .bib |
||
2. | An Attribute Based Key Agreement Protocol Resilient to KCI Attack
|
|
Majid Bayat, MohammadReza Aref, Vol. 2, No. 1, 2015, pp. 10-20 Article Full Text PDF .bib |
||
3. | MMOPRG Bot Detection Based on Traffic Analysis
|
|
Ye Zhu, Yuanchao Lu, Matthew Itomlenskis, Seetharamayya Vyaghri, Huirong Fu, Vol. 2, No. 1, 2015, pp. 21-31 Article Full Text PDF .bib |
||
4. | Learning to Dialogue in Identifying User's Interest by Partial Observable Markov Decision Process
|
|
Oscar Li Jen Hsu, Von-Wun Soo, Vol. 2, No. 1, 2015, pp. 32-46 Article Full Text PDF .bib |
||
5. | A Multi-secret Sharing Scheme Based on the CRT and RSA
|
|
Xuedong Dong, Vol. 2, No. 1, 2015, pp. 47-51 Article Full Text PDF .bib |
||
6. | Reviewer index to volume 2 (2015)
|
|