Sciweavers

IJNSEC
2016
48views more  IJNSEC 2016»
10 years 1 months ago
Key Trees Combining Algorithm for Overlapping Resource Access Members
In cloud computing environment, resources are accessed by multiple members. Resources may be considered as VM, CPU, Storage etc. Group key management required when multiple member...
Amar Buchade, Rajesh Ingle
IJMMS
2016
44views more  IJMMS 2016»
10 years 1 months ago
Categorization of seismic sources by auditory display: A blind test
15 Recordings of the Earth’s surface oscillation as a function of time (seismograms) can be sonified by compressing time so that most of the signal’s frequency spectrum falls ...
Arthur Paté, Lapo Boschi, Jean-Loïc Le...
IJMI
2016
61views more  IJMI 2016»
10 years 1 months ago
Effects of eHealth for patients and informal caregivers confronted with cancer: A meta-review
Vina N. Slev, Patriek Mistiaen, H. Roeline W. Pasm...
IJISEC
2016
46views more  IJISEC 2016»
10 years 1 months ago
Link-time smart card code hardening
This paper presents a feasibility study to protect smart card software against fault-injection attacks by means of link-time code rewriting. This approach avoids the drawbacks of s...
Ronald De Keulenaer, Jonas Maebe, Koen De Bosscher...