


default search action
Computer Standards & Interfaces, Volume 31
Volume 31, Number 1, January 2009
- Tzungher Chen

, Chin-Chen Chang, Chang-Sian Wu, Der-Chyuan Lou
:
On the security of a copyright protection scheme based on visual cryptography. 1-5 - Hyun Sook Rhee, Jeong Ok Kwon, Dong Hoon Lee:

A remote user authentication scheme without using smart cards. 6-13 - (Withdrawn) The software engineering model's categories of compliance. 14-18

- Xuan Hong, Kefei Chen:

Secure multiple-times proxy signature scheme. 19-23 - Yi-Pin Liao, Shuenn-Shyang Wang:

A secure dynamic ID based remote user authentication scheme for multi-server environment. 24-29 - Marco Cereia, Ivan Cibrario Bertolotti:

Virtual machines for distributed real-time systems. 30-39 - Kuo-Hsuan Huang, Yu-Fang Chung

, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen
:
Efficient migration for mobile computing in distributed networks. 40-47 - J. Michael Tarn, Chuan Pang, David C. Yen

, Jon Chen:
Exploring the implementation and application of Bluetooth technology in the shipping industry. 48-55 - Yong Yu

, Bo Yang, Ying Sun, Shenglin Zhu:
Identity based signcryption scheme without random oracles. 56-62 - Raphael Chung-Wei Phan

:
Cryptanalysis of the application secure alternative to SNMP (APSSNMP). 63-65 - Jyh-Win Huang, Ting-Wei Hou:

A controllable and accountable state-oriented Card-Aided Firewall. 66-76 - Monika Kapus-Kolar:

An action refinement operator for E-LOTOS with true concurrency. 77-87 - Pedro Peris-Lopez

, Julio César Hernández Castro
, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification. 88-97 - Haim Kilov, Ira Sack:

Mechanisms for communication between business and IT experts. 98-109 - Chunlin Li, Layuan Li:

An efficient coordination scheme between layers of grid architecture. 110-119 - Julián Proenza

, José Miró-Julià, Hans Hansson
:
Managing redundancy in CAN-based networks supporting N-Version Programming. 120-127 - Yuh-Min Tseng:

USIM-based EAP-TLS authentication protocol for wireless local area networks. 128-136 - Hyun-Sung Kim

, Sung-Woon Lee
:
Area and time efficient AB2 multipliers based on cellular automata. 137-143 - Gülçin Büyüközkan

:
Determining the mobile commerce user requirements using an analytic approach. 144-152 - Cemal Kocak, Ismail Erturk, Hüseyin Ekiz:

MPLS over ATM and IP over ATM methods for multimedia applications. 153-160 - Suk Lee, Kyoung Nam Ha, Kyung Chang Lee

:
Performance evaluation of MAC layer of LnCP and LonWorks protocol as home networking system. 161-168 - Jianghong Hu, Jianzhong Zhang:

Cryptanalysis and improvement of a threshold proxy signature scheme. 169-173 - Luis Guijarro

:
Semantic interoperability in eGovernment initiatives. 174-180 - Thulasi Goriparthi, Manik Lal Das, Ashutosh Saxena

:
An improved bilinear pairing based remote user authentication scheme. 181-185 - Elisardo González-Agulla, Enrique Otero Muras, Carmen García-Mateo

, José Luis Alba-Castro:
A multiplatform Java wrapper for the BioAPI framework. 186-191 - Jen-Chiun Lin, Kuo-Hsuan Huang, Feipei Lai, Hung-Chang Lee:

Secure and efficient group key management with shared key derivation. 192-208 - Kuo-Qin Yan, Shu-Ching Wang, Mao-Lun Chiang

, Lin-Yu Tseng
:
A fuzzy-based Power-aware management for mobile ad hoc networks. 209-218 - Chien-Fu Cheng

, Shu-Ching Wang, Tyne Liang:
The anatomy study of server-initial agreement for general hierarchy wired/wireless networks. 219-226 - Heng-Li Yang, Chi-Lun Liu:

A new standard of on-line customer service process: Integrating language-action into blogs. 227-245 - Antonio Izquierdo, José María Sierra

, Joaquín Torres Márquez:
An analysis of conformance issues in implementations of standardized security protocols. 246-251 - Rong Zhao, Jian-jie Zhao, Fang Dai, Fengqun Zhao:

A new image secret sharing scheme to identify cheaters. 252-257 - Ji-Seon Lee, Jik Hyun Chang:

Comment on Saeednia et al.'s strong designated verifier signature scheme. 258-260
Volume 31, Number 2, February 2009
- Carlos Rodríguez-Morcillo

, Sadot Alexandres, J. D. Muñoz:
Broadband system to increase bitrate in train communication networks. 261-271 - Hui-Feng Huang:

A novel access control protocol for secure sensor networks. 272-276 - Victor R. L. Shen, Yu-Fang Chung

, Tzer-Shyong Chen
:
A novel application of grey system theory to information security (Part I). 277-281 - Wei Gao, Fei Li, Xueli Wang:

Chameleon hash without key exposure based on Schnorr signature. 282-285 - Liufei Wu, Yuqing Zhang, Fengjiao Wang:

A new provably secure authentication and key agreement protocol for SIP using ECC. 286-291 - Cheng-Huang Tung, En-Yih Jean:

A modified phoneme-based Chinese input method for minimizing conflict code rate. 292-299 - Yu-Fang Chung

, Kuo-Hsuan Huang, Tzer-Shyong Chen
:
Threshold authenticated encryption scheme using labor-division signature. 300-304 - Denis Trcek, Damjan Kovac:

Formal apparatus for measurement of lightweight protocols. 305-308 - Marta Rey-López, Rebeca P. Díaz Redondo

, Ana Fernández Vilas
, José Juan Pazos-Arias, Jorge García Duque, Alberto Gil-Solla
, Manuel Ramos Cabrer
:
An extension to the ADL SCORM standard to support adaptivity: The t-learning case-study. 309-318 - Chun-I Fan, D. J. Guan, Chih-I Wang, Dai-Rui Lin:

Cryptanalysis of Lee-Hwang-Yang blind signature scheme. 319-320 - Mafruz Zaman Ashrafi, See-Kiong Ng:

Privacy-preserving e-payments using one-time payment details. 321-328 - Der-Chyuan Lou

, Ming-Chiang Hu, Jiang-Lung Liu:
Multiple layer data hiding scheme for medical images. 329-335 - María Ángeles Moraga

, Coral Calero
, Javier Garzás, Mario Piattini
:
Assessment of portlet quality: Collecting real experience. 336-347 - Yong Yu

, Chunxiang Xu, Xinyi Huang, Yi Mu:
An efficient anonymous proxy signature scheme with provable security. 348-353 - Ernesto Exposito

, Mathieu Gineste, Laurent Dairaine, Christophe Chassot:
Building self-optimized communication systems based on applicative cross-layer information. 354-361 - Jae-Ho Lee, Jong-Gyu Hwang, Ducko Shin, Kang-Mi Lee, Sung Un Kim:

Development of verification and conformance testing tools for a railway signaling communication protocol. 362-371 - Pedro Peris-Lopez

, Julio César Hernández Castro
, Juan M. Estévez-Tapiador
, Arturo Ribagorda:
Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. 372-380 - Hao-Chuan Tsai, Chin-Chen Chang, Kai-Jie Chang:

Roaming across wireless local area networks using SIM-based authentication protocol. 381-389 - Hongzhen Du, Qiaoyan Wen:

Efficient and provably-secure certificateless short signature scheme from bilinear pairings. 390-394 - Jung-San Lee, Chin-Chen Chang:

Design of electronic t-out-of-n lotteries on the Internet. 395-400 - Kuo-Hsuan Huang, Yu-Fang Chung

, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen
:
A conference key agreement protocol with fault-tolerant capability. 401-405 - Tzu-Chi Huang, Ce-Kuen Shieh, Bo-Yang Lai, Yu-Ben Miao:

Network Application Programming Interface over Session Initiation Protocol, a novel approach to the global roaming environment. 406-419 - Der-Chyuan Lou

, Chiang-Lung Liu, Chih-Lin Lin:
Message estimation for universal steganalysis using multi-classification support vector machine. 420-427 - S. Venkatesan, Chenniappan Chellappan:

Generating routing table for free roaming mobile agent in distributed environment. 428-436 - Yung-Wei Kao, Tzu-Han Kao, Chi-Yang Tsai, Shyan-Ming Yuan

:
A personal Web page tailoring toolkit for mobile devices. 437-453 - Chunshan Shen, Fei Shen, ZhongCheng Wu, Jiarong Luo:

Application of session initiation protocol to networked sensor interfaces. 454-457 - Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang:

Hiding data in spatial domain images with distortion tolerance. 458-464 - Ki-Hyun Jung, Kee-Young Yoo:

Data hiding method using image interpolation. 465-470 - Adriana Del Carmen Tellez Anguiano

, F. Rivas-Cruz, Carlos-M. Astorga-Zaragoza
, Efraín Alcorta-García
, David Juárez-Romero
:
Process control interface system for a distillation plant. 471-479 - Haeryong Park, Seongan Lim, Ikkwon Yie:

A privacy problem on Hu-Huang's proxy key generation protocol. 480-483 - Pedro J. Muñoz Merino

, Carlos Delgado Kloos
, Jesús Fernández Naranjo:
Enabling interoperability for LMS educational services. 484-498 - Joydeb Roy Chowdury, Sayantica Pattanayak, A. K. Bhattacharjee:

Design methodology for battery powered embedded systems - In safety critical application. 499-503 - Rodrigo Palucci Pantoni, Dennis Brandão

:
Developing and implementing an open and non-proprietary device description for FOUNDATION fieldbus based on software standards. 504-514 - Silvano R. Rossi

, Edward David Moreno, Aparecido Augusto de Carvalho
, Alexandre C. R. da Silva, Edson Antonio Batista, Thiago Alexandre Prado, Tércio A. Santos Filho
:
A VHDL-based protocol controller for NCAP processors. 515-522 - Grace C.-W. Ting, Bok-Min Goi

, Swee-Huay Heng
:
Attack on a semi-blind watermarking scheme based on singular value decomposition. 523-525
Volume 31, Number 3, March 2009
- Nitaigour-Premchand Mahalik:

Guest Editorial. 527 - Francesco Basile

, Pasquale Chiacchio
, Domenico Del Grosso:
A two-stage modelling architecture for distributed control of real-time industrial systems: Application of UML and Petri Net. 528-538 - Feng Xia

, Youxian Sun, Yu-Chu Tian
:
Feedback scheduling of priority-driven control networks. 539-547 - Marek Miskowicz:

Access delay in LonTalk MAC protocol. 548-556 - Jun Wang, Sijing Zhang, Carsten Maple, Zhengxu Zhao:

Guaranteeing hard real-time traffic with legitimately short deadlines with the timed token protocol. 557-565 - Gianluca Cena

, Lucia Seno, Adriano Valenzano, Stefano Vitturi
:
Performance analysis of Ethernet Powerlink networks for distributed control and automation systems. 566-572 - Kok Kiong Tan, Sunan Huang, Zhang Yi, Tong Heng Lee:

Distributed fault detection in industrial system based on sensor wireless network. 573-578 - Xianghui Cao

, Jiming Chen, Youxian Sun:
An interface designed for networked monitoring and control in wireless sensor networks. 579-585 - Nitaigour-Premchand Mahalik, Matthew Yen:

Extending fieldbus standards to food processing and packaging industry: A review. 586-598 - Adnan Salihbegovic, Vlatko Marinkovic, Zoran Cico, Elvedin Karavdic, Nina Delic:

Web based multilayered distributed SCADA/HMI system in refinery application. 599-612
Volume 31, Number 4, June 2009
- Vassilios Peristeras

, Konstantinos A. Tarabanis
, Sotirios K. Goudos
:
Model-driven eGovernment interoperability: A review of the state of the art. 613-628
- Rongyu He, Guolei Zhao, Chaowen Chang, Hui Xie, Xi Qin, Zheng Qin:

A PK-SIM card based end-to-end security framework for SMS. 629-641 - Mi Wen, Yanfei Zheng, Wen-jun Ye, Kefei Chen, Weidong Qiu:

A key management protocol with robust continuity for sensor networks. 642-647 - Daewan Han, Daesung Kwon:

Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards. 648-652 - Borut Jereb

:
Software describing attributes. 653-660 - Hwanyong Lee

, Nakhoon Baek
:
AlexVG: An OpenVG implementation with SVG-Tiny support. 661-668 - Yu-Fang Chung

, Zhen Yu Wu, Tzer-Shyong Chen
:
Ring signature scheme for ECC-based anonymous signcryption. 669-674 - Mark Umberger, Iztok Humar, Andrej Kos, Joze Guna

, Andrej Zemva, Janez Bester:
The integration of home-automation and IPTV system and services. 675-684 - Tomaz Turk:

Price aggregation in an end-to-end QoS provisioning. 685-692 - Arpit Mittal, Arijit Sengupta:

Improvised layout of keypad entry system for mobile phones. 693-698 - Long-Sheng Li, Gwo-Chuan Lee, Wei-Zan Wang:

A root-based strategy for constructing a clustered MANET in all-IP networks. 699-706 - Sherman S. M. Chow

:
Blind signature and ring signature schemes: Rehabilitation and attack. 707-712 - L. Y. Tseng, Y. H. Chin, Shu-Chin Wang:

The anatomy study of high performance task scheduling algorithm for Grid computing system. 713-722 - Jing Xu, Wen Tao Zhu, Dengguo Feng:

An improved smart card based password authentication scheme with provable security. 723-728 - Chien-Ping Chang, Jen-Chun Lee, Yu Su, Ping Sheng Huang, Te-Ming Tu:

Using empirical mode decomposition for iris recognition. 729-739 - Yung Fu Chang, C. S. Chen, Hao Zhou:

Smart phone for mobile commerce. 740-747 - Yeu-Pong Lai, Ruan-Han Dai:

The implementation guidance for practicing network isolation by referring to ISO-17799 standard. 748-756 - Ming-Shi Wang, Wei-Che Chen:

A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography. 757-762 - Deepti Mishra

, Alok Mishra
:
Simplified software inspection process in compliance with international standards. 763-771 - Chin-Chen Chang, Ting-Fang Cheng:

An efficient proxy raffle protocol with anonymity-preserving. 772-778 - Aleksander Vreze, Bostjan Vlaovic

, Zmago Brezocnik:
Sdl2pml - Tool for automated generation of Promela model from SDL specification. 779-786 - Yu-An Ho, Yung-Kuan Chan

, Hsien-Chu Wu, Yen-Ping Chu:
High-capacity reversible data hiding in binary images using pattern substitution. 787-794 - Shiuh-Jeng Wang, Da-Yu Kao, Frank Fu-Yuan Huang:

Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models. 795-800 - Sourour Karmani, Ridha Djemal, Rached Tourki:

Efficient hardware architecture of 2D-scan-based wavelet watermarking for image and video. 801-811 - Eun-Kyung Ryu, Tsuyoshi Takagi:

A hybrid approach for privacy-preserving RFID tags. 812-815 - Sedat Atmaca

, Celal Ceken
, Ismail Erturk:
A new QoS-aware TDMA/FDD MAC protocol with multi-beam directional antennas. 816-829 - Shuo Ding:

Protocol interoperability in mobile IP enabled mobile ad hoc networks. 830-845 - I-Ching Hsu, Yuan Kwei Tzeng, Der-Cheng Huang:

OWL-L: An OWL-based language for Web resources links. 846-855 - Haeryong Park, Seongan Lim, Ikkwon Yie, Kitae Kim, Junghwan Song:

Strong unforgeability in group signature schemes. 856-862 - Hao-Rung Chung, Wei-Chi Ku, Maw-Jinn Tsaur:

Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments. 863-868
Volume 31, Number 5, September 2009
- Irfan Awan, Qun Jin, Kuo-Ming Chao

:
Specification, standards and information management for distributed systems. 869 - Andrew Flahive, David Taniar, J. Wenny Rahayu, Bernady O. Apduhan:

Ontology tailoring in the Semantic Grid. 870-885 - Fatos Xhafa

, Leonard Barolli, Thanasis Daradoumis
, Raul Fernandez, Santi Caballé
:
Jxta-Overlay: An interface for efficient peer selection in P2P JXTA-based systems. 886-893 - Musbah Shahop Sagar, David A. Duce, Muhammad Younas:

The Oea framework for class-based object-oriented style JavaScript for web programming. 894-905 - Tomoya Enokido, Valbona Barolli, Makoto Takizawa

:
A legal information flow (LIF) scheduler based on role-based access control model. 906-912 - Salvatore Vitabile

, Vincenzo Conti, Carmelo Militello
, Filippo Sorbello:
An extended JADE-S based framework for developing secure Multi-Agent Systems. 913-930
- Kemal Bicakci

, Bülent Tavli
:
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks. 931-941
- Monika Kapus-Kolar:

Reversible enhanced event structures: Towards reversible E-LOTOS. 942-947 - Minghui Zheng, Hui-Hua Zhou, Jun Li, Guohua Cui:

Efficient and provably secure password-based group key agreement protocol. 948-953 - Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante

, Riccardo Sisto
, Adriano Valenzano:
Tools for cryptographic protocols analysis: A technical and experimental comparison. 954-961 - Daniel Belega

, Dominique Dallet:
Choice of the acquisition parameters for frequency estimation of a sine wave by interpolated DFT method. 962-968 - Juan Trujillo

, Emilio Soler
, Eduardo Fernández-Medina
, Mario Piattini
:
A UML 2.0 profile to define security requirements for Data Warehouses. 969-983 - Cihan Sahin, Emine Dogru Bolat:

Development of remote control and monitoring of web-based distributed OPC system. 984-993 - Jin Wang

, Huaijiang Sun:
A new evidential trust model for open communities. 994-1001 - Gaurav Bhatnagar

, Balasubramanian Raman:
A new robust reference watermarking scheme based on DWT-SVD. 1002-1013 - Luis Álvarez Sabucedo, Luis E. Anido-Rifón

, Rubén Míguez Pérez, Juan M. Santos-Gago
:
Providing standard-oriented data models and interfaces to eGovernment services: A semantic-driven approach. 1014-1027 - Eric Jui-Lin Lu, Chin-Ju Hsieh:

A relation metadata extension for SCORM Content Aggregation Model. 1028-1035 - David C. Chou, Amy Y. Chou:

Information systems outsourcing life cycle and risks analysis. 1036-1043
Volume 31, Number 6, November 2009
- Fenareti Lampathaki

, Spiros Mouzakitis
, George Gionis, Yannis Charalabidis, Dimitris Askounis:
Business to business interoperability: A current review of XML data integration standards. 1045-1055
- Marko Hölbl

, Tatjana Welzer:
Two improved two-party identity-based authenticated key agreement protocols. 1056-1060 - Yu-Fang Chung

, Tzer-Shyong Chen
, Ming-Wei Lai:
Efficient migration access control for mobile agents. 1061-1068 - Rajaram Ramasamy, Amutha Prabakar Muniyandi

, M. Indra Devi:
A new algorithm for encryption/decryption for field applications. 1069-1072 - Manuel Díaz

, Daniel Garrido
, Luis Llopis
, José M. Troya:
Designing distributed software with RT-CORBA and SDL. 1073-1091 - Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang:

An efficient and provable secure identity-based ring signcryption scheme. 1092-1097 - Hakjae Kim, Ryong Oh, Sungju Lee, Taesup Kim, Sangjoon Lee, Yongwha Chung, Choong-Ho Cho:

A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment. 1098-1107 - Hassina Nacer Talantikite

, Djamil Aïssani
, Nacer Boudjlida:
Semantic annotations for web services discovery and composition. 1108-1117 - Han-Cheng Hsiang

, Wei-Kuan Shih:
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment. 1118-1123 - Eun Young Choi, Dong Hoon Lee, Jong In Lim:

Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems. 1124-1130 - Chunlin Li, Layuan Li:

Utility-based scheduling for grid computing under constraints of energy budget and deadline. 1131-1142 - Shih-Chieh Shie, Shinfeng D. Lin:

Data hiding based on compressed VQ indices of images. 1143-1149 - Edward David Moreno, José Ivo Fernandes de Oliveira:

Architectural impact of the SVG-based graphical components in web applications. 1150-1157 - Jeff Waters, Brenda J. Powers, Marion G. Ceruti:

Global Interoperability Using Semantics, Standards, Science and Technology (GIS3T). 1158-1166 - Nai-Wei Lo, Kuo-Hui Yeh:

Cryptanalysis of two three-party encrypted key exchange protocols. 1167-1174 - Geerten van de Kaa, Frank T. H. den Hartog, Henk Jan de Vries

:
Mapping standards for home networking. 1175-1181 - Kevin W. Hamlen, Vishwath Mohan, Mohammad M. Masud

, Latifur Khan
, Bhavani Thuraisingham:
Exploiting an antivirus interface. 1182-1189
- Weiguo Zhang, Shuanggen Liu, Huawei Huang:

An efficient implementation algorithm for generating de Bruijn sequences. 1190-1191

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














