


default search action
Computer Standards & Interfaces, Volume 30
Volume 30, Numbers 1-2, January 2008
- Kwo-Jean Farn, Shu-Kuo Lin, Chi-Chun Lo:

A study on e-Taiwan information system security classification and implementation. 1-7 - Emmanouil Vlastos, Ahmed Patel:

An open source forensic tool to visualize digital evidence. 8-19 - Celal Ceken

:
An energy efficient and delay sensitive centralized MAC protocol for wireless sensor networks. 20-31 - Grace C.-W. Ting, Bok-Min Goi

, Swee-Huay Heng
:
Attacks on a robust watermarking scheme based on self-reference image. 32-35 - Seungjun Kim

, Nitaigour-Premchand Mahalik, Anind K. Dey, Jeha Ryu
, Byung-Ha Ahn:
Feasibility and infrastructural study of AR interfacing and intuitive simulation on 3D nonlinear systems. 36-51 - Yi-Hung Huang, Kuan-Cheng Lin, Chao-Yu Kuo, Chin-Hsing Chen, Yen-Ping Chu:

Enhancement of fairness in a DiffServ network using a novel queuing algorithm. 52-61 - María del Puerto Paule Ruíz

, M. Jesús Fernández Díaz, Francisco Ortín Soler
, Juan Ramón Pérez-Pérez
:
Adaptation in current e-learning systems. 62-70 - Tian-Fu Lee, Mei-Jiun Sung:

Communication-efficient AUTHMAC_DH protocols. 71-77 - Shao-Shin Hung, Damon Shing-Min Liu:

A user-oriented ontology-based approach for network intrusion detection. 78-88 - Fagen Li

, Xiangjun Xin, Yupu Hu:
Indentity-based broadcast signcryption. 89-94 - Hsing-Bai Chen, Tzungher Chen

, Wei-Bin Lee, Chin-Chen Chang:
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks. 95-99
Volume 30, Number 3, March 2008
- Raphael Chung-Wei Phan

:
Cryptanalysis of e-mail protocols providing perfect forward secrecy. 101-105 - Tzu-Chao Lin:

Progressive decision-based mean type filter for image noise suppression. 106-114 - Yong-Gang Fu, Ruimin Shen:

Color image watermarking scheme based on linear discriminant analysis. 115-120 - Kyung-Ah Shim:

Forgery attacks on the ID-based multisignature scheme without reblocking and predetermined signing order. 121-123 - José Luis Salazar, Joan Josep Piles, José Ruíz-Mas, José María Moreno-Jiménez

:
E-cognocracy and its voting process. 124-131 - Wei Lu, Fu-Lai Chung

, Hongtao Lu, Kup-Sze Choi
:
Detecting fake images using watermarks and support vector machines. 132-136 - Salvador Bueno

, Jose L. Salmeron
:
Fuzzy modeling Enterprise Resource Planning tool selection. 137-147 - Pui-Lai To, Chechen Liao, Jerry C. Chiang, Meng-Lin Shih, Chun-Yuan Chang:

An empirical investigation of the factors affecting the adoption of Instant Messaging in organizations. 148-156 - S. Da'na, Assim Sagahyroon, A. Elrayes, Abdul-Rahman Al-Ali, R. Al-Aydi:

Development of a monitoring and control platform for PLC-based applications. 157-166 - Xiaohui Liang

, Zhenfu Cao
, Rongxing Lu, Liuquan Qin:
Efficient and secure protocol in fair document exchange. 167-176 - Ibrahim Özçelik

, Hüseyin Ekiz:
Design, implementation and performance analysis of the CAN/ATM local bridge. 177-186 - Massoud Hadian Dehkordi, Samaneh Mashhadi

:
An efficient threshold verifiable multi-secret sharing. 187-190 - Hui-Chieh Lu, Yen-Ping Chu, Ruey-Kai Sheu, Win-Tsung Lo:

A generic application sharing architecture based on message-oriented middleware platform. 191-199 - Cüneyt Bayilmis

, Ismail Erturk, Celal Ceken
, Ibrahim Özçelik
:
A CAN/IEEE 802.11b wireless Lan local bridge design. 200-212
Volume 30, Number 4, May 2008
- Ahmed Patel:

Frameworks for secure, forensically safe and auditable applications. 213-215 - Rok Bojanc, Borka Jerman-Blazic:

Towards a standard approach for quantifying an ICT security investment. 216-222 - Vasilios Katos

, Peter M. Bednar
:
A cyber-crime investigation framework. 223-228 - Giannakis Antoniou, Leon Sterling, Stefanos Gritzalis

, Parampalli Udaya
:
Privacy and forensics investigation process: The ERPINA protocol. 229-236 - Norleyza Jailani

, Noor Faezah Mohd Yatim, Yazrina Yahya, Ahmed Patel, Mazliza Othman
:
Secure and auditable agent-based e-marketplace framework for mobile users. 237-252 - Vicente Benjumea

, Javier López
, José M. Troya:
Anonymity analysis in credentials-based systems: A formal framework. 253-261 - Theodore Tryfonas

, Bob Kearney:
Standardising business application security assessments with pattern-driven audit automations. 262-270
Volume 30, Number 5, July 2008
- Yu-Tzu Lin, Ja-Ling Wu

:
Content adaptive watermarking for multimedia fingerprinting. 271-287 - Seung-Hyun Seo

, Jung Yeon Hwang, Kyu Young Choi
, Dong Hoon Lee:
Identity-based universal designated multi-verifiers signature schemes. 288-295 - Yeon-Seok Kim, Kyong-Ho Lee

:
Extracting logical structures from HTML tables. 296-308 - Eun-Jun Yoon, Kee-Young Yoo:

Improving the novel three-party encrypted key exchange protocol. 309-314 - Anna Medve:

Advanced steps with standardized languages in the re-engineering process. 315-322 - Pedro M. Ramos

, A. Cruz Serra:
Impedance measurement using multiharmonic least-squares waveform fitting algorithm. 323-328 - Shu-Ching Wang, Hsin-Hung Pan

, Kuo-Qin Yan, Yu-lung Lo:
A unified framework for cluster manager election and clustering mechanism in mobile ad hoc networks. 329-338
Volume 30, Number 6, August 2008
- Eduardo Fernández-Medina

, Mariemma Inmaculada Yagüe del Valle
:
State of standards in the information systems security area. 339-340 - Emilio Soler

, Juan Trujillo
, Eduardo Fernández-Medina
, Mario Piattini
:
Building a secure star schema in data warehouses by an extension of the relational package from CWM. 341-350 - Omid Tafreschi, Dominique Mähler, Janina Fengel, Michael Rebstock, Claudia Eckert:

A reputation system for electronic negotiations. 351-360 - Daniel Mellado, Eduardo Fernández-Medina

, Mario Piattini
:
Towards security requirements management for software product lines: A security domain requirements engineering process. 361-371 - Berthold Agreiter, Michael Hafner, Ruth Breu:

A fair Non-repudiation service in a web services peer-to-peer environment. 372-378 - Ernesto Damiani

, Majirus Fansi, Alban Gabillon, Stefania Marrara:
A general approach to securely querying XML. 379-389 - Klaus Plößl, Hannes Federrath:

A privacy aware and efficient security infrastructure for vehicular ad hoc networks. 390-397 - Gerardo Canfora

, Elisa Costante, Igino Pennino, Corrado Aaron Visaggio
:
A three-layered model to implement data privacy policies. 398-409 - Anna Zych, Milan Petkovic, Willem Jonker:

Efficient key management for cryptographically enforced access control. 410-417 - Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta

, Manuel Sánchez:
A proposal for extending the eduroam infrastructure with authorization mechanisms. 418-423 - Marco Prandini

, Marco Ramilli:
Redesigning remote system administration paradigms for enhanced security and flexibility. 424-432

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














