Journal: Computers & Electrical Engineering

Volume 33, Issue 5-6

321 -- 323Paris Kitsos, Nicolas Sklavos. Guest Editors Introduction to the Special Issue on Security of Computers and Networks
324 -- 332Kazuo Sakiyama, Lejla Batina, Bart Preneel, Ingrid Verbauwhede. HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
333 -- 348Apostolos P. Fournaris, Odysseas G. Koufopavlou. Applying systolic multiplication-inversion architectures based on modified extended Euclidean algorithm for GF(2:::k:::) in elliptic curve cryptography
349 -- 366Grace Elias, Ali Miri, Tet Hin Yeap. On efficient implementation of FPGA-based hyperelliptic curve cryptosystems
367 -- 382Elke De Mulder, Siddika Berna Örs, Bart Preneel, Ingrid Verbauwhede. Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems
383 -- 391Timo Alho, Panu Hämäläinen, Marko Hännikäinen, Timo D. Hämäläinen. Compact modular exponentiation accelerator for modern FPGA devices
392 -- 406Maurice Keller, Robert Ronan, William P. Marnane, Colin C. Murphy. Hardware architectures for the Tate pairing over GF(2:::m:::)
407 -- 424Asaf Ashkenazi, Dmitry Akselrod. Platform independent overall security architecture in multi-processor system-on-chip integrated circuits for use in mobile phones and handheld devices
425 -- 437Drago Zagar, Kresimir Grgic, Snjezana Rimac-Drlje. Security aspects in IPv6 networks - implementation and testing
438 -- 451Zorana Bankovic, Dusan Stepanovic, Slobodan Bojanic, Octavio Nieto-Taladriz. Improving network security using genetic algorithm approach

Volume 33, Issue 4

231 -- 232Mohamed Abid. Guest Editorial
233 -- 248Stephen Coe, Shawki Areibi, Medhat Moussa. A hardware Memetic accelerator for VLSI circuit partitioning
249 -- 268N. Gorse, P. Bélanger, Alexandre Chureau, El Mostapha Aboulhamid, Yvon Savaria. A high-level requirements engineering methodology for electronic system-level design
269 -- 284Amir Masoud Gharehbaghi, Benyamin Hamdin Yaran, Shaahin Hessabi, Maziar Goudarzi. An assertion-based verification methodology for system-level design
285 -- 298Abdellatif Mtibaa, Bouraoui Ouni, Mohamed Abid. An efficient list scheduling algorithm for time placement problem
299 -- 309Hervé Charlery, Adrijean Andriahantenaina, Alain Greiner. Physical design of the VCI wrappers for the on-chip packet-switched network named SPIN
310 -- 319Thomas Hollstein, Manfred Glesner. Advanced hardware/software co-design on reconfigurable network-on-chip based hyper-platforms

Volume 33, Issue 3

153 -- 165Liang-Teh Lee, Chen-Feng Wu. An HMM-based call admission control policy for supporting QoS in wireless cellular networks
166 -- 176Yu Long, Kefei Chen, Shengli Liu. ID-based threshold decryption secure against adaptive chosen-ciphertext attack
177 -- 185Yu-Chuan Liu, Hsiang-An Wen, Chun-Li Lin, Tzonelih Hwang. Proxy-protected signature secure against the undelegated proxy signature attack
186 -- 194R. Shantha Selva Kumari, V. Sadasivam. A novel algorithm for wavelet based ECG signal coding
195 -- 207Fei Xu, Chip-Hong Chang, Ching-Chuen Jong. Hamming weight pyramid - A new insight into canonical signed digit representation and its applications
208 -- 220Chun-Wei Tseng, Chu-Sing Yang. System support for web hosting services on server clusters
221 -- 229Nong-Kun Chen, Jiann-Liang Chen. Feedback QoS control scheme for wireless network applications

Volume 33, Issue 2

79 -- 87Richard Demo Souza, Javier Garcia-Frias, Renato da Rocha Lopes. Turbo equalization for block fading MIMO channels using random signal mapping
88 -- 93Lifeng Guo, Guilin Wang. Insider attacks on multi-proxy multi-signature schemes
94 -- 108Ho-Ting Wu, Kai-Wei Ke, Shunyong Huang. A novel multicast mechanism for optical local area networks
109 -- 126F. Javier Díaz, Angel M. Buron, José M. Solana. Haar wavelet based processor scheme for image coding with low circuit complexity
127 -- 132P. P. Sahu. Improvement of jitter transfer characteristics of a 9.95328Gb/s data recovery DLL using saw filter
133 -- 138Shiang-Feng Tzeng, Yuan-Liang Tang, Min-Shiang Hwang. A new convertible authenticated encryption scheme with message linkages
139 -- 148Ganesan Periakarruppan, Hairul A. Abdul-Rashid. Packet based echo cancellation for VoIP networks

Volume 33, Issue 1

1 -- 11Liang-Teh Lee, Der-Fu Tao, Chieh Tsao. An adaptive scheme for predicting the usage of grid resources
12 -- 29Wenming Li, Krishna M. Kavi, Robert Akl. A non-preemptive scheduling algorithm for soft real-time systems
30 -- 47Elif Derya Übeyli, Inan Güler. Performance analysis of classical, model-based and eigenvector methods: Ophthalmic arterial disorders detection case
48 -- 57Asim Bhatti, Saeid Nahavandi, Yakov Frayman. 3D depth estimation for visual inspection using wavelet transform modulus maxima
58 -- 69Sezer Gören, F. Joel Ferguson. On state reduction of incompletely specified finite state machines
70 -- 78Kalim Qureshi, Paul Manuel. Adaptive pre-task assignment scheduling strategy for heterogeneous distributed raytracing system