- Bo Meng, Wei Huang, Zimao Li, Dejun Wang. Automatic Verification of Security Properties in Remote Internet Voting Protocol with Applied Pi Calculus. JDCTA, 4(7):88-107, 2010.
- Yiqun Li, Li Xiong, Rui Wang. The Informatization Development of Foreign Trade Enterprise in China: Case in Proceeding Trade. JDCTA, 4(7):79-87, 2010.
- Fatemeh NasserEslami, Fatemeh Saghafi. Safety technologies impacts survey in M-services security provision. JDCTA, 4(4):207-214, 2010.
- Peng Wang, Haiqi Dai, Shuliang Ding. Computerized Adaptive Testing in Chinese Mainland: A Review. JDCTA, 4(6):94-99, 2010.
- Wang Yu, Zhu Feng, Geng Hua, Zhuwang Jing. The Partner Selection in Virtual Enterprise based on BDI Agent. JDCTA, 4(9):36-43, 2010.
- Liping Zhang, Fengyu Lei, Jin Chen. The Larger Integer Library and the Diffie-Hellman Protocol based on XTR. JDCTA, 4(7):108-114, 2010.
- Xin-Hua Zhu, Qing-ling Zeng, Qing-hua Cao. A Complex XML Schema to Map the XML Documents of Distance Education Technical Specifications into Relational Database. JDCTA, 4(8):182-192, 2010.
- Xiaowei Zhang, Bin Li, Junwu Zhu, Jun Wu. Utility Based Optimal Task Scheduling Problem in a Multi-agent System. JDCTA, 4(9):27-35, 2010.
- Shifei Ding, Li Xu, Hong Zhu, Liwen Zhang. Research and Progress of Cluster Algorithms based on Granular Computing. JDCTA, 4(5):96-104, 2010.
- Mojtaba Romoozi, Hossein Ebrahimpour-Komleh. A Positioning Method in Wireless Sensor Networks Using Genetic Algorithms. JDCTA, 4(9):174-179, 2010.