Search Results

There are 13574 results for: content related to: Person-Centered Emotional Support and Gender Attributions in Computer-Mediated Communication

  1. You have free access to this content
    Who are “stinkybug” and “Packerfan4”? Email Pseudonyms and Participants’ Perceptions of Demography, Productivity, and Personality

    Journal of Computer-Mediated Communication

    Volume 12, Issue 1, October 2006, Pages: 114–135, Jennifer M. Heisler and Scott L. Crabill

    Article first published online : 20 DEC 2006, DOI: 10.1111/j.1083-6101.2006.00317.x

  2. Cryptanalysis and improvement of password-authenticated key agreement for session initiation protocol using smart cards

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2405–2411, Liping Zhang, Shanyu Tang and Zhihua Cai

    Article first published online : 17 JAN 2014, DOI: 10.1002/sec.951

  3. Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.

    International Journal of Communication Systems

    Volume 28, Issue 7, 10 May 2015, Pages: 1340–1351, Qi Jiang, Jianfeng Ma and Youliang Tian

    Article first published online : 27 FEB 2014, DOI: 10.1002/dac.2767

  4. Efficient and flexible password authenticated key agreement for Voice over Internet Protocol Session Initiation Protocol using smart card

    International Journal of Communication Systems

    Volume 27, Issue 11, November 2014, Pages: 2691–2702, Liping Zhang, Shanyu Tang and Zhihua Cai

    Article first published online : 13 JAN 2013, DOI: 10.1002/dac.2499

  5. A new authenticated key agreement for session initiation protocol

    International Journal of Communication Systems

    Volume 25, Issue 1, January 2012, Pages: 47–54, Qi Xie

    Article first published online : 20 MAY 2011, DOI: 10.1002/dac.1286

  6. In their words: Connecting on-line weblogs to developmental processes

    British Journal of Developmental Psychology

    Volume 27, Issue 1, March 2009, Pages: 219–245, Kaveri Subrahmanyam, Eddie C. M. Garcia, Lidwina Stella Harsono, Janice S. Li and Lawrence Lipana

    Article first published online : 23 DEC 2010, DOI: 10.1348/026151008X345979

  7. The reliability of user authentication through keystroke dynamics

    Statistica Neerlandica

    Volume 63, Issue 4, November 2009, Pages: 432–449, Salima Douhou and Jan R. Magnus

    Article first published online : 6 AUG 2009, DOI: 10.1111/j.1467-9574.2009.00434.x

  8. A secure mutual authentication scheme for session initiation protocol using elliptic curve cryptography

    Security and Communication Networks

    Volume 5, Issue 12, December 2012, Pages: 1423–1429, Debiao He, Jianhua Chen and Yitao Chen

    Article first published online : 8 FEB 2012, DOI: 10.1002/sec.506

  9. What to Say to an Online Support-Seeker? The Influence of Others' Responses and Support-Seekers' Replies

    Human Communication Research

    Volume 41, Issue 3, July 2015, Pages: 303–326, Siyue Li and Bo Feng

    Article first published online : 5 DEC 2014, DOI: 10.1111/hcre.12055

  10. Building an end-to-end ISP broadband infrastructure as an advanced networking subject

    Computer Applications in Engineering Education

    Christopher Raymond Miles and Ka Ching Chan

    Article first published online : 25 JUN 2015, DOI: 10.1002/cae.21667

  11. Almighty Twitter, what are people asking for?

    Proceedings of the American Society for Information Science and Technology

    Volume 49, Issue 1, 2012, Pages: 1–10, Zhe Liu and Bernard J. Jansen

    Article first published online : 24 JAN 2013, DOI: 10.1002/meet.14504901134

  12. Bibliometrics for Internet media: Applying the h-index to YouTube

    Journal of the American Society for Information Science and Technology

    Volume 64, Issue 11, November 2013, Pages: 2326–2331, Robert Hovden

    Article first published online : 12 SEP 2013, DOI: 10.1002/asi.22936

  13. Unix Survival Guide

    Unit

    Current Protocols in Bioinformatics

    1:A1.C.1–A1.C.27

    Lincoln D. Stein

    Published Online : 3 SEP 2015, DOI: 10.1002/0471250953.bia01cs51

  14. Security enhancements for UDDI

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 871–887, Alexander J. O'Ree and Mohammed S. Obaidat

    Article first published online : 2 FEB 2011, DOI: 10.1002/sec.217

  15. Identifying an OpenID anti-phishing scheme for cyberspace

    Security and Communication Networks

    Haider Abbas, Moeen Qaemi Mahmoodzadeh, Farrukh Aslam Khan and Maruf Pasha

    Article first published online : 7 MAY 2014, DOI: 10.1002/sec.1027

  16. Using the iPlant Collaborative Discovery Environment

    Unit

    Current Protocols in Bioinformatics

    1:1.22.1–1.22.26

    Shannon L. Oliver, Andrew J. Lenards, Roger A. Barthelson, Nirav Merchant and Sheldon J. McKay

    Published Online : 1 JUN 2013, DOI: 10.1002/0471250953.bi0122s42

  17. Problem-Focused Content in the Job Search: Two Tests of the Cognitive-Emotional Theory of Esteem Support Messages

    Human Communication Research

    Volume 40, Issue 2, April 2014, Pages: 161–187, Amanda J. Holmstrom, David D. Clare and Jessica C. Russell

    Article first published online : 28 JAN 2014, DOI: 10.1111/hcre.12025

  18. PRIVACY LEAKAGE IN HEALTH SOCIAL NETWORKS

    Computational Intelligence

    Volume 30, Issue 3, August 2014, Pages: 514–534, Ahmed Al Faresi, Ahmed Alazzawe and Anis Alazzawe

    Article first published online : 21 MAR 2013, DOI: 10.1111/coin.12005

  19. You have full text access to this OnlineOpen article
    Cloud Computing for Pharmacometrics: Using AWS, NONMEM, PsN, Grid Engine, and Sonic

    CPT: Pharmacometrics & Systems Pharmacology

    S Sanduja, P Jewell, E Aron and N Pharai

    Article first published online : 22 AUG 2015, DOI: 10.1002/psp4.12016

  20. You have free access to this content
    A classifier to determine which Wikipedia biographies will be accepted

    Journal of the Association for Information Science and Technology

    Volume 66, Issue 1, January 2015, Pages: 213–218, Nir Ofek and Lior Rokach

    Article first published online : 16 APR 2014, DOI: 10.1002/asi.23199