


default search action
Journal of Research and Practice in Information Technology, Volume 40
Volume 40, Number 1, 2008
- Sidney A. Morris:

Editorial. 1 - Chad Lin, Graham Pervan, Hsiu-Yuan Tsao, Koong H.-C. Lin:

An Investigation into Business-to-Business Electronic Commerce Organizations. 3-18 - Tom McBride:

A Model for Investigating Software Accidents. 19-32 - Nan Tang, Jeffrey Xu Yu, Kam-Fai Wong, Jianxin Li:

Fast XML Structural Join Algorithms by Partitioning. 33-54 - Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li:

Identity-Based Parallel Key-Insulated Signature: Framework and Construction. 55-68
Volume 40, Number 2, 2008
- Sidney A. Morris:

Editorial. 69 - Tapio Litmanen, Anu Tulkkanen:

Global Sense of Risk: Media Reporting on Scientific Studies and Potential Risk of Mobile Phones. 71-90 - Gwan-Hwan Hwang, Hsin-Fu Lin, Chun-Chin Sy, Chiu-Yang Chang:

The Design and Implementation of Appointed File Prefetching for Distributed File Systems. 91-108 - Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr:

Design Space Exploration of a Reconfigurable HMAC-Hash Unit. 109-128 - Ashfaqur Rahman, M. Manzur Murshed:

Dynamic Texture Synthesis Using Motion Distribution Statistics. 129-148
Volume 40, Number 3, 2008
- Ljiljana Brankovic, Mirka Miller, Chris Steketee:

Guest Editorial. 149 - Kirsten Wahlstrom, Gerald Quirchmayr:

A Privacy-Enhancing Architecture for Databases. 151-162 - Adepele Williams, Ken Barker:

Controlling Inference: Avoiding P-level Reduction During Analysis. 163-186 - Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:

Security Analysis of Australian and E.U. E-passport Implementation. 187-206 - Volker Fusenig, Dagmara Spiewak, Thomas Engel:

Anonymous Communication in Multi Hop Wireless Networks. 207-228
Volume 40, Number 4, 2008
- Ljiljana Brankovic, Mirka Miller, Chris Steketee:

Guest Editorial. 229 - Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:

Deploying Access and Flow Control in Distributed Workflows. 231-254 - Pino Caballero-Gil, Amparo Fúster-Sabater, Oscar Delgado-Mohatar:

Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences. 255-262 - Josep M. Miret, Rosana Tomàs, Magda Valls, Daniel Sadornil, Juan Tena:

Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves. 263-274 - Kun Peng, Feng Bao, Ed Dawson:

Correct, Private, Flexible and Efficient Range Test. 275-289

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














