期刊論文 Collection home page

Browse
Subscribe to this collection to receive daily e-mail notification of new additions RSS Feed RSS Feed RSS Feed
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 98
DateTitleAuthor(s)
20-Nov-2019An Analysis of Trust, Distrust, and Their Antecedents: Development of a Comprehensive Model of Consumer Intentions in Technology-Driven TransactionsSimon, Steven John; Cagle, Carol J.
20-Nov-2019Secure WLAN Handoff Scheme with Continuous AuthenticationSingh, Rajeev; Sharma, Teek P.
20-Nov-2019Metamorphic Malware Detection Using Function Call Graph AnalysisDeshpande, Prasad; Stamp, Mark
20-Nov-2019Probabilistic Approach of Improved Binary PSO Algorithm Using Mobile Sink NodesAnand, S. Raj; Kannan, E.
20-Nov-2019Editor`s IntroductionLi, Eldon Y.
16-Aug-2016Development of an In-House Grid Testbed Supporting Scheduling and Execution of Scientific WorkflowsPrajapati, Harshadkumar B.;Shah, Vipul A.
16-Aug-2016Implementation of N-Cryptographic Multilevel Cryptography Using RSA and Substitution CryptosystemAdebayo, Olawale S.;Olalere, Morufu;Ugwu, Joel N.
16-Aug-2016Antecedents and Consequences of Trust in Using Mobile BankingYu, Chian-Son
16-Aug-2016Exploring the Role of Culture in eWOM AdoptionPentina, Iryna;Basmanova, Oksana;Zhang, Lixuan;Ukis, Yuliya
16-Aug-2016Securing E-Commerce Business Using Hybrid Combination Based on New Symmetric Key and RSA AlgorithmKuppuswamy, Prakash;Saeed, Q. Y. Al-Khalidi
16-Aug-2016A Discrete Formulation of Successive Software Releases Based on Imperfect DebuggingSingh, Jagvinder;Anand, Adarsh;Kumar, Avneesh;Khatri, Sunil Kumar
16-Aug-2016Data Management Issues and Data Mining of Real Time System Application for Environment MonitoringSaini, Dinesh Kumar;Maskari, Sanad Al
16-Aug-2016Insights into Motivation to Participate in Online SurveysFoster, Mary K.;Michon, Richard
16-Aug-2016Modelling e-Health Systems Security Requirements: A Business Process Based ApproachAlahmadi, Ahmed H.;Soh, Ben;Ullah, Azmat
16-Aug-2016Detection and Analysis of Security Vulnerabilities in JavaKumar, Ch. Aswani;Charitha, M. Sai
16-Aug-2016Exploring Donation Appeals in Top Not-for-Profit WebsitesPitts, Robert E.;Blose, Julia E.;Mack, Rhonda W.
16-Aug-2016Hybrid Encryption/Decryption Technique Using New Public Key and Symmetric Key AlgorithmKuppuswamy, Prakash;Saeed, Q. Y. Al-Khalidi
16-Aug-2016Securing DNA Information through Public Key CryptographyTripathi, Shiv P. N.;Jaiswal, Manas;Singh, Vrijendra
16-Aug-2016On Measuring and Increasing the Effectiveness of Banner AdvertisingGhosh, Haren;Bhatnagar, Amit
16-Aug-2016Posting Articles for Occupational Stress Reduction in Social Networking Sites: A View of Social Cognitive TheoryYen, Yung-Shen
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 98

Discover

By people