default search action
Computer Standards & Interfaces, Volume 27
Volume 27, Number 1, November 2004
- Goldie Gabrani:
A distributed queue approach to resource locations in broadband distributed computing environments. 1-18 - Chu-Hsing Lin, Yi-Yi Lai:
A flexible biometrics remote user authentication scheme. 19-23 - Tzungher Chen, Wei-Bin Lee, Gwoboa Horng:
Secure SAS-like password authentication schemes. 25-31 - Tzer-Shyong Chen:
A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem. 33-38 - Woei-Jiunn Tsaur, Chia Chun Wu, Wei-Bin Lee:
A smart card-based remote scheme for password authentication in multi-server Internet services. 39-51 - Zuhua Shao:
Improvement of threshold proxy signature scheme. 53-59 - Zuhua Shao:
Improvement of digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem. 61-69 - Mohammad A. Al-Rousan, S. Ahmed:
Implementation of cache coherence protocol for COMA multiprocessor systems based on the scalable coherent interface. 71-88
Volume 27, Number 2, January 2005
- Adam Theiss, David C. Yen, Cheng-Yuan Ku:
Global Positioning Systems: an analysis of applications, current development and future implementations. 89-100 - Ales Vobornik:
Protection for software in measuring instruments. 101-104 - Zhi Wang, Xingfa Shen, Jiming Chen, Yeqiong Song, Tianran Wang, Youxian Sun:
Real-time performance evaluation of urgent aperiodic messages in FF communication and its improvement. 105-115 - Tibor Gyires, H. Joseph Wen:
Extension of Multiprotocol Label Switching for long-range dependent traffic: QoS routing and performance in IP networks. 117-132 - Goldie Gabrani, Tushar Mulkar:
A quad-tree based algorithm for processor allocation in 2D mesh-connected multicomputers. 133-147 - Jiung-yao Huang, Ming-Chih Tung, Kuei Min Wang, Ming-Che Lee:
Smart Time Management - the unified time synchronization interface for the distributed simulation. 149-161 - Sheng-Yu Hwang, Hsiang-An Wen, Tzonelih Hwang:
On the security enhancement for anonymous secure e-voting over computer network. 163-168 - Hui-Feng Huang, Chin-Chen Chang:
Multisignatures with distinguished signing authorities for sequential and broadcasting architectures. 169-176 - Narn-Yih Lee, Yu-Chung Chiu:
Improved remote authentication scheme with smart card. 177-180 - Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo:
Improvement of Chien et al.'s remote user authentication scheme using smart cards. 181-183 - Woo-Hun Kim, Eun-Kyung Ryu, Jae-Yuel Im, Kee-Young Yoo:
New conference key agreement protocol with user anonymity. 185-190
Volume 27, Number 3, March 2005
- Gusztáv Adamis, Róbert Horváth, Zoltán Pap, Katalin Tarnay:
Standardized languages for telecommunication systems. 191-205 - Jae-Ho Lee, Jong-Gyu Hwang, Gwi-Tae Park:
Performance evaluation and verification of communication protocol for railway signaling systems. 207-219 - Jeon Il Moon, Jung Sub Kim, Jong Bae Kim, Kye Young Lim, Byoung Wook Choi:
A hardware implementation of distributed network protocol. 221-232 - David C. Chou, Kirill M. Yurov:
Security development in Web Services environment. 233-240 - Eric Jui-Lin Lu, Yi-Hui Chen:
A flexible delegation processor for web-based information systems. 241-256 - Bhavani Thuraisingham:
Security standards for the semantic web. 257-268 - Giorgos Gousios, Efthimia Aivaloglou, Stefanos Gritzalis:
Distributed component architectures security issues. 269-284 - Yichuan Jiang, P. Yi, Shiyong Zhang, Yiping Zhong:
Constructing agents blackboard communication architecture based on graph theory. 285-301 - Shiang-Feng Tzeng, Min-Shiang Hwang, Hsing-Bai Chen:
A secure on-line software transaction scheme. 303-312 - Ya-Fen Chang, Chin-Chen Chang, Jen-Ho Yang:
An efficient password authenticated key exchange protocol for imbalanced wireless networks. 313-322 - Qiang Tang, Chris J. Mitchell:
Comments on a cryptographic key assignment scheme. 323-326
Volume 27, Number 4, April 2005
- David C. Yen, David C. Chou:
Editorial. 327-328 - Yung Fu Chang, C. S. Chen:
Smart phone - the choice of client platform for mobile commerce. 329-336 - Changi Nam, Dong-Hoon Yang, Euehun Lee, Seongcheol Kim, Jeong-Hoon Kim:
Effect of time of adoption on consumer preference for transport telematics services. 337-346 - Pruthikrai Mahatanankoon, H. Joseph Wen, Billy B. L. Lim:
Consumer-based m-commerce: exploring consumer perception of mobile applications. 347-357 - Shin-Yuan Hung, Chia-Ming Chang:
User acceptance of WAP services: test of competing theories. 359-370 - Hsin-Pin Fu, Tien-Hsiang Chang, Lon-Fon Shieh, Wen-Hsiung Wu:
An implementation model for WEGS in WLAN applications: a Taiwanese case. 371-381 - Dong-Her Shih, Shin-Yi Huang, David C. Yen:
A new reverse auction agent system for m-commerce using mobile agents. 383-395 - Qiang Tang, Chris J. Mitchell:
Comments on two anonymous conference key distribution systems. 397-400 - Rongxing Lu, Zhenfu Cao:
Non-interactive deniable authentication protocol based on factoring. 401-405 - Chin-Chen Chang, Iuon-Chang Lin, Kwok-Yan Lam:
An ID-based multisignature scheme without reblocking and predetermined signing order. 407-413 - Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen:
Design of a fair proxy raffle protocol on the Internet. 415-422 - Donna M. Evans, David C. Yen:
Private key infrastructure: balancing computer transmission privacy with changing technology and security demands. 423-437
Volume 27, Number 5, June 2005
- Ahmed Patel:
Formal methods, techniques and tools for secure and reliable applications. 439-443 - Fabio Massacci, Marco Prest, Nicola Zannone:
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. 445-455 - Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph:
On a formal framework for security properties. 457-466 - Javier López, José A. Montenegro, José Luis Vivas, Eiji Okamoto, Ed Dawson:
Specification and design of advanced authentication and authorization services. 467-478 - Wenbo Mao:
A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols. 479-488 - Javier López, Juan J. Ortega, José M. Troya:
Security protocols analysis: A SDL-based approach. 489-499 - Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas:
Specifying Privacy-Preserving Protocols in Typed MSR. 501-512 - Jimmy McGibney, Nikita Schmidt, Ahmed Patel:
A service-centric model for intrusion detection in next-generation networks. 513-520 - Costas Lambrinoudakis, Stefanos Gritzalis, Petros Hatzopoulos, Athanasios N. Yannacopoulos, Sokratis K. Katsikas:
A formal model for pricing information systems insurance contracts. 521-532 - Daniel Cvrcek, Václav Matyás Jr., Ahmed Patel:
Evidence processing and privacy issues in evidence-based reputation systems. 533-545 - Stamatis Karnouskos:
Security-enabled code deployment for heterogeneous networks. 547-560
Volume 27, Number 6, June 2005
- Borka Jerman-Blazic, Tomaz Klobucar:
Privacy provision in e-learning standardized systems: status and improvements. 561-578 - Min-Huang Ho, Yue-Shan Chang, Kuang-Lee Li, Shyan-Ming Yuan:
The Federated Forums based Integrated Biological Data Mining Broker. 579-596 - Francisco Durán, Manuel Roldán, Antonio Vallecillo:
Using Maude to write and execute ODP information viewpoint specifications. 597-620 - Tzu-Liang (Bill) Tseng, Wen-Yau Liang, Chun-Che Huang, Tsung-Yu Chian:
Applying genetic algorithm for the development of the components-based embedded system. 621-635 - Ridha Djemal, Ayoub Dhouib, Samuel Dellacherie, Rached Tourki:
A novel formal verification approach for RTL hardware IP cores. 637-651 - F. J. Jiménez, José De Frutos:
Virtual instrument for measurement, processing data, and visualization of vibration patterns of piezoelectric devices. 653-663 - Gianluca Cena, Adriano Valenzano, Stefano Vitturi:
Advances in automotive digital communications. 665-678 - Tatjana Kostic, Otto Preiss, Christian Frei:
Understanding and using the IEC 61850: a case for meta-modelling. 679-695
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.