default search action
Computer Standards & Interfaces, Volume 31
Volume 31, Number 1, January 2009
- Tzungher Chen, Chin-Chen Chang, Chang-Sian Wu, Der-Chyuan Lou:
On the security of a copyright protection scheme based on visual cryptography. 1-5 - Hyun Sook Rhee, Jeong Ok Kwon, Dong Hoon Lee:
A remote user authentication scheme without using smart cards. 6-13 - (Withdrawn) The software engineering model's categories of compliance. 14-18
- Xuan Hong, Kefei Chen:
Secure multiple-times proxy signature scheme. 19-23 - Yi-Pin Liao, Shuenn-Shyang Wang:
A secure dynamic ID based remote user authentication scheme for multi-server environment. 24-29 - Marco Cereia, Ivan Cibrario Bertolotti:
Virtual machines for distributed real-time systems. 30-39 - Kuo-Hsuan Huang, Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen:
Efficient migration for mobile computing in distributed networks. 40-47 - J. Michael Tarn, Chuan Pang, David C. Yen, Jon Chen:
Exploring the implementation and application of Bluetooth technology in the shipping industry. 48-55 - Yong Yu, Bo Yang, Ying Sun, Shenglin Zhu:
Identity based signcryption scheme without random oracles. 56-62 - Raphael Chung-Wei Phan:
Cryptanalysis of the application secure alternative to SNMP (APSSNMP). 63-65 - Jyh-Win Huang, Ting-Wei Hou:
A controllable and accountable state-oriented Card-Aided Firewall. 66-76 - Monika Kapus-Kolar:
An action refinement operator for E-LOTOS with true concurrency. 77-87 - Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. 88-97 - Haim Kilov, Ira Sack:
Mechanisms for communication between business and IT experts. 98-109 - Chunlin Li, Layuan Li:
An efficient coordination scheme between layers of grid architecture. 110-119 - Julián Proenza, José Miró-Julià, Hans Hansson:
Managing redundancy in CAN-based networks supporting N-Version Programming. 120-127 - Yuh-Min Tseng:
USIM-based EAP-TLS authentication protocol for wireless local area networks. 128-136 - Hyun-Sung Kim, Sung-Woon Lee:
Area and time efficient AB2 multipliers based on cellular automata. 137-143 - Gülçin Büyüközkan:
Determining the mobile commerce user requirements using an analytic approach. 144-152 - Cemal Kocak, Ismail Erturk, Hüseyin Ekiz:
MPLS over ATM and IP over ATM methods for multimedia applications. 153-160 - Suk Lee, Kyoung Nam Ha, Kyung Chang Lee:
Performance evaluation of MAC layer of LnCP and LonWorks protocol as home networking system. 161-168 - Jianghong Hu, Jianzhong Zhang:
Cryptanalysis and improvement of a threshold proxy signature scheme. 169-173 - Luis Guijarro:
Semantic interoperability in eGovernment initiatives. 174-180 - Thulasi Goriparthi, Manik Lal Das, Ashutosh Saxena:
An improved bilinear pairing based remote user authentication scheme. 181-185 - Elisardo González-Agulla, Enrique Otero Muras, Carmen García-Mateo, José Luis Alba-Castro:
A multiplatform Java wrapper for the BioAPI framework. 186-191 - Jen-Chiun Lin, Kuo-Hsuan Huang, Feipei Lai, Hung-Chang Lee:
Secure and efficient group key management with shared key derivation. 192-208 - Kuo-Qin Yan, Shu-Ching Wang, Mao-Lun Chiang, Lin-Yu Tseng:
A fuzzy-based Power-aware management for mobile ad hoc networks. 209-218 - Chien-Fu Cheng, Shu-Ching Wang, Tyne Liang:
The anatomy study of server-initial agreement for general hierarchy wired/wireless networks. 219-226 - Heng-Li Yang, Chi-Lun Liu:
A new standard of on-line customer service process: Integrating language-action into blogs. 227-245 - Antonio Izquierdo, José María Sierra, Joaquín Torres Márquez:
An analysis of conformance issues in implementations of standardized security protocols. 246-251 - Rong Zhao, Jian-jie Zhao, Fang Dai, Fengqun Zhao:
A new image secret sharing scheme to identify cheaters. 252-257 - Ji-Seon Lee, Jik Hyun Chang:
Comment on Saeednia et al.'s strong designated verifier signature scheme. 258-260
Volume 31, Number 2, February 2009
- Carlos Rodríguez-Morcillo, Sadot Alexandres, J. D. Muñoz:
Broadband system to increase bitrate in train communication networks. 261-271 - Hui-Feng Huang:
A novel access control protocol for secure sensor networks. 272-276 - Victor R. L. Shen, Yu-Fang Chung, Tzer-Shyong Chen:
A novel application of grey system theory to information security (Part I). 277-281 - Wei Gao, Fei Li, Xueli Wang:
Chameleon hash without key exposure based on Schnorr signature. 282-285 - Liufei Wu, Yuqing Zhang, Fengjiao Wang:
A new provably secure authentication and key agreement protocol for SIP using ECC. 286-291 - Cheng-Huang Tung, En-Yih Jean:
A modified phoneme-based Chinese input method for minimizing conflict code rate. 292-299 - Yu-Fang Chung, Kuo-Hsuan Huang, Tzer-Shyong Chen:
Threshold authenticated encryption scheme using labor-division signature. 300-304 - Denis Trcek, Damjan Kovac:
Formal apparatus for measurement of lightweight protocols. 305-308 - Marta Rey-López, Rebeca P. Díaz Redondo, Ana Fernández Vilas, José Juan Pazos-Arias, Jorge García Duque, Alberto Gil-Solla, Manuel Ramos Cabrer:
An extension to the ADL SCORM standard to support adaptivity: The t-learning case-study. 309-318 - Chun-I Fan, D. J. Guan, Chih-I Wang, Dai-Rui Lin:
Cryptanalysis of Lee-Hwang-Yang blind signature scheme. 319-320 - Mafruz Zaman Ashrafi, See-Kiong Ng:
Privacy-preserving e-payments using one-time payment details. 321-328 - Der-Chyuan Lou, Ming-Chiang Hu, Jiang-Lung Liu:
Multiple layer data hiding scheme for medical images. 329-335 - María Ángeles Moraga, Coral Calero, Javier Garzás, Mario Piattini:
Assessment of portlet quality: Collecting real experience. 336-347 - Yong Yu, Chunxiang Xu, Xinyi Huang, Yi Mu:
An efficient anonymous proxy signature scheme with provable security. 348-353 - Ernesto Exposito, Mathieu Gineste, Laurent Dairaine, Christophe Chassot:
Building self-optimized communication systems based on applicative cross-layer information. 354-361 - Jae-Ho Lee, Jong-Gyu Hwang, Ducko Shin, Kang-Mi Lee, Sung Un Kim:
Development of verification and conformance testing tools for a railway signaling communication protocol. 362-371 - Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda:
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. 372-380 - Hao-Chuan Tsai, Chin-Chen Chang, Kai-Jie Chang:
Roaming across wireless local area networks using SIM-based authentication protocol. 381-389 - Hongzhen Du, Qiaoyan Wen:
Efficient and provably-secure certificateless short signature scheme from bilinear pairings. 390-394 - Jung-San Lee, Chin-Chen Chang:
Design of electronic t-out-of-n lotteries on the Internet. 395-400 - Kuo-Hsuan Huang, Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen:
A conference key agreement protocol with fault-tolerant capability. 401-405 - Tzu-Chi Huang, Ce-Kuen Shieh, Bo-Yang Lai, Yu-Ben Miao:
Network Application Programming Interface over Session Initiation Protocol, a novel approach to the global roaming environment. 406-419 - Der-Chyuan Lou, Chiang-Lung Liu, Chih-Lin Lin:
Message estimation for universal steganalysis using multi-classification support vector machine. 420-427 - S. Venkatesan, Chenniappan Chellappan:
Generating routing table for free roaming mobile agent in distributed environment. 428-436 - Yung-Wei Kao, Tzu-Han Kao, Chi-Yang Tsai, Shyan-Ming Yuan:
A personal Web page tailoring toolkit for mobile devices. 437-453 - Chunshan Shen, Fei Shen, ZhongCheng Wu, Jiarong Luo:
Application of session initiation protocol to networked sensor interfaces. 454-457 - Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang:
Hiding data in spatial domain images with distortion tolerance. 458-464 - Ki-Hyun Jung, Kee-Young Yoo:
Data hiding method using image interpolation. 465-470 - Adriana Del Carmen Tellez Anguiano, F. Rivas-Cruz, Carlos-M. Astorga-Zaragoza, Efraín Alcorta-García, David Juárez-Romero:
Process control interface system for a distillation plant. 471-479 - Haeryong Park, Seongan Lim, Ikkwon Yie:
A privacy problem on Hu-Huang's proxy key generation protocol. 480-483 - Pedro J. Muñoz Merino, Carlos Delgado Kloos, Jesús Fernández Naranjo:
Enabling interoperability for LMS educational services. 484-498 - Joydeb Roy Chowdury, Sayantica Pattanayak, A. K. Bhattacharjee:
Design methodology for battery powered embedded systems - In safety critical application. 499-503 - Rodrigo Palucci Pantoni, Dennis Brandão:
Developing and implementing an open and non-proprietary device description for FOUNDATION fieldbus based on software standards. 504-514 - Silvano R. Rossi, Edward David Moreno, Aparecido Augusto de Carvalho, Alexandre C. R. da Silva, Edson Antonio Batista, Thiago Alexandre Prado, Tércio A. Santos Filho:
A VHDL-based protocol controller for NCAP processors. 515-522 - Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng:
Attack on a semi-blind watermarking scheme based on singular value decomposition. 523-525
Volume 31, Number 3, March 2009
- Nitaigour-Premchand Mahalik:
Guest Editorial. 527 - Francesco Basile, Pasquale Chiacchio, Domenico Del Grosso:
A two-stage modelling architecture for distributed control of real-time industrial systems: Application of UML and Petri Net. 528-538 - Feng Xia, Youxian Sun, Yu-Chu Tian:
Feedback scheduling of priority-driven control networks. 539-547 - Marek Miskowicz:
Access delay in LonTalk MAC protocol. 548-556 - Jun Wang, Sijing Zhang, Carsten Maple, Zhengxu Zhao:
Guaranteeing hard real-time traffic with legitimately short deadlines with the timed token protocol. 557-565 - Gianluca Cena, Lucia Seno, Adriano Valenzano, Stefano Vitturi:
Performance analysis of Ethernet Powerlink networks for distributed control and automation systems. 566-572 - Kok Kiong Tan, Sunan Huang, Zhang Yi, Tong Heng Lee:
Distributed fault detection in industrial system based on sensor wireless network. 573-578 - Xianghui Cao, Jiming Chen, Youxian Sun:
An interface designed for networked monitoring and control in wireless sensor networks. 579-585 - Nitaigour-Premchand Mahalik, Matthew Yen:
Extending fieldbus standards to food processing and packaging industry: A review. 586-598 - Adnan Salihbegovic, Vlatko Marinkovic, Zoran Cico, Elvedin Karavdic, Nina Delic:
Web based multilayered distributed SCADA/HMI system in refinery application. 599-612
Volume 31, Number 4, June 2009
- Vassilios Peristeras, Konstantinos A. Tarabanis, Sotirios K. Goudos:
Model-driven eGovernment interoperability: A review of the state of the art. 613-628
- Rongyu He, Guolei Zhao, Chaowen Chang, Hui Xie, Xi Qin, Zheng Qin:
A PK-SIM card based end-to-end security framework for SMS. 629-641 - Mi Wen, Yanfei Zheng, Wen-jun Ye, Kefei Chen, Weidong Qiu:
A key management protocol with robust continuity for sensor networks. 642-647 - Daewan Han, Daesung Kwon:
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards. 648-652 - Borut Jereb:
Software describing attributes. 653-660 - Hwanyong Lee, Nakhoon Baek:
AlexVG: An OpenVG implementation with SVG-Tiny support. 661-668 - Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen:
Ring signature scheme for ECC-based anonymous signcryption. 669-674 - Mark Umberger, Iztok Humar, Andrej Kos, Joze Guna, Andrej Zemva, Janez Bester:
The integration of home-automation and IPTV system and services. 675-684 - Tomaz Turk:
Price aggregation in an end-to-end QoS provisioning. 685-692 - Arpit Mittal, Arijit Sengupta:
Improvised layout of keypad entry system for mobile phones. 693-698 - Long-Sheng Li, Gwo-Chuan Lee, Wei-Zan Wang:
A root-based strategy for constructing a clustered MANET in all-IP networks. 699-706 - Sherman S. M. Chow:
Blind signature and ring signature schemes: Rehabilitation and attack. 707-712 - L. Y. Tseng, Y. H. Chin, Shu-Chin Wang:
The anatomy study of high performance task scheduling algorithm for Grid computing system. 713-722 - Jing Xu, Wen Tao Zhu, Dengguo Feng:
An improved smart card based password authentication scheme with provable security. 723-728 - Chien-Ping Chang, Jen-Chun Lee, Yu Su, Ping Sheng Huang, Te-Ming Tu:
Using empirical mode decomposition for iris recognition. 729-739 - Yung Fu Chang, C. S. Chen, Hao Zhou:
Smart phone for mobile commerce. 740-747 - Yeu-Pong Lai, Ruan-Han Dai:
The implementation guidance for practicing network isolation by referring to ISO-17799 standard. 748-756 - Ming-Shi Wang, Wei-Che Chen:
A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. 757-762 - Deepti Mishra, Alok Mishra:
Simplified software inspection process in compliance with international standards. 763-771 - Chin-Chen Chang, Ting-Fang Cheng:
An efficient proxy raffle protocol with anonymity-preserving. 772-778 - Aleksander Vreze, Bostjan Vlaovic, Zmago Brezocnik:
Sdl2pml - Tool for automated generation of Promela model from SDL specification. 779-786 - Yu-An Ho, Yung-Kuan Chan, Hsien-Chu Wu, Yen-Ping Chu:
High-capacity reversible data hiding in binary images using pattern substitution. 787-794 - Shiuh-Jeng Wang, Da-Yu Kao, Frank Fu-Yuan Huang:
Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models. 795-800 - Sourour Karmani, Ridha Djemal, Rached Tourki:
Efficient hardware architecture of 2D-scan-based wavelet watermarking for image and video. 801-811 - Eun-Kyung Ryu, Tsuyoshi Takagi:
A hybrid approach for privacy-preserving RFID tags. 812-815 - Sedat Atmaca, Celal Ceken, Ismail Erturk:
A new QoS-aware TDMA/FDD MAC protocol with multi-beam directional antennas. 816-829 - Shuo Ding:
Protocol interoperability in mobile IP enabled mobile ad hoc networks. 830-845 - I-Ching Hsu, Yuan Kwei Tzeng, Der-Cheng Huang:
OWL-L: An OWL-based language for Web resources links. 846-855 - Haeryong Park, Seongan Lim, Ikkwon Yie, Kitae Kim, Junghwan Song:
Strong unforgeability in group signature schemes. 856-862 - Hao-Rung Chung, Wei-Chi Ku, Maw-Jinn Tsaur:
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments. 863-868
Volume 31, Number 5, September 2009
- Irfan Awan, Qun Jin, Kuo-Ming Chao:
Specification, standards and information management for distributed systems. 869 - Andrew Flahive, David Taniar, J. Wenny Rahayu, Bernady O. Apduhan:
Ontology tailoring in the Semantic Grid. 870-885 - Fatos Xhafa, Leonard Barolli, Thanasis Daradoumis, Raul Fernandez, Santi Caballé:
Jxta-Overlay: An interface for efficient peer selection in P2P JXTA-based systems. 886-893 - Musbah Shahop Sagar, David A. Duce, Muhammad Younas:
The Oea framework for class-based object-oriented style JavaScript for web programming. 894-905 - Tomoya Enokido, Valbona Barolli, Makoto Takizawa:
A legal information flow (LIF) scheduler based on role-based access control model. 906-912 - Salvatore Vitabile, Vincenzo Conti, Carmelo Militello, Filippo Sorbello:
An extended JADE-S based framework for developing secure Multi-Agent Systems. 913-930
- Kemal Bicakci, Bülent Tavli:
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. 931-941
- Monika Kapus-Kolar:
Reversible enhanced event structures: Towards reversible E-LOTOS. 942-947 - Minghui Zheng, Hui-Hua Zhou, Jun Li, Guohua Cui:
Efficient and provably secure password-based group key agreement protocol. 948-953 - Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Tools for cryptographic protocols analysis: A technical and experimental comparison. 954-961 - Daniel Belega, Dominique Dallet:
Choice of the acquisition parameters for frequency estimation of a sine wave by interpolated DFT method. 962-968 - Juan Trujillo, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini:
A UML 2.0 profile to define security requirements for Data Warehouses. 969-983 - Cihan Sahin, Emine Dogru Bolat:
Development of remote control and monitoring of web-based distributed OPC system. 984-993 - Jin Wang, Huai-Jiang Sun:
A new evidential trust model for open communities. 994-1001 - Gaurav Bhatnagar, Balasubramanian Raman:
A new robust reference watermarking scheme based on DWT-SVD. 1002-1013 - Luis Álvarez Sabucedo, Luis E. Anido-Rifón, Ruben Míguez Pérez, Juan M. Santos-Gago:
Providing standard-oriented data models and interfaces to eGovernment services: A semantic-driven approach. 1014-1027 - Eric Jui-Lin Lu, Chin-Ju Hsieh:
A relation metadata extension for SCORM Content Aggregation Model. 1028-1035 - David C. Chou, Amy Y. Chou:
Information systems outsourcing life cycle and risks analysis. 1036-1043
Volume 31, Number 6, November 2009
- Fenareti Lampathaki, Spiros Mouzakitis, George Gionis, Yannis Charalabidis, Dimitris Askounis:
Business to business interoperability: A current review of XML data integration standards. 1045-1055
- Marko Hölbl, Tatjana Welzer:
Two improved two-party identity-based authenticated key agreement protocols. 1056-1060 - Yu-Fang Chung, Tzer-Shyong Chen, Ming-Wei Lai:
Efficient migration access control for mobile agents. 1061-1068 - Rajaram Ramasamy, Amutha Prabakar Muniyandi, M. Indra Devi:
A new algorithm for encryption/decryption for field applications. 1069-1072 - Manuel Díaz, Daniel Garrido, Luis Llopis, José M. Troya:
Designing distributed software with RT-CORBA and SDL. 1073-1091 - Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang:
An efficient and provable secure identity-based ring signcryption scheme. 1092-1097 - Hakjae Kim, Ryong Oh, Sungju Lee, Taesup Kim, Sangjoon Lee, Yongwha Chung, Choong-Ho Cho:
A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment. 1098-1107 - Hassina Nacer Talantikite, Djamil Aïssani, Nacer Boudjlida:
Semantic annotations for web services discovery and composition. 1108-1117 - Han-Cheng Hsiang, Wei-Kuan Shih:
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. 1118-1123 - Eun Young Choi, Dong Hoon Lee, Jong In Lim:
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems. 1124-1130 - Chunlin Li, Layuan Li:
Utility-based scheduling for grid computing under constraints of energy budget and deadline. 1131-1142 - Shih-Chieh Shie, Shinfeng D. Lin:
Data hiding based on compressed VQ indices of images. 1143-1149 - Edward David Moreno, José Ivo Fernandes de Oliveira:
Architectural impact of the SVG-based graphical components in web applications. 1150-1157 - Jeff Waters, Brenda J. Powers, Marion G. Ceruti:
Global Interoperability Using Semantics, Standards, Science and Technology (GIS3T). 1158-1166 - Nai-Wei Lo, Kuo-Hui Yeh:
Cryptanalysis of two three-party encrypted key exchange protocols. 1167-1174 - Geerten van de Kaa, Frank T. H. den Hartog, Henk Jan de Vries:
Mapping standards for home networking. 1175-1181 - Kevin W. Hamlen, Vishwath Mohan, Mohammad M. Masud, Latifur Khan, Bhavani Thuraisingham:
Exploiting an antivirus interface. 1182-1189
- Weiguo Zhang, Shuanggen Liu, Huawei Huang:
An efficient implementation algorithm for generating de Bruijn sequences. 1190-1191
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.