427 | -- | 430 | Harald Schumny. 25 volumes of Computer Standards and Interfaces completed |
431 | -- | 436 | Zuhua Shao. Security of robust generalized MQV key agreement protocol without using one-way hash functions |
437 | -- | 446 | Sean Lancaster, David C. Yen, Shi-Ming Huang. Public key infrastructure: a micro and macro analysis |
447 | -- | 461 | Andrew Ren-Wei Fung, Kwo-Jean Farn, Abe C. Lin. Paper: a study on the certification of the information security management systems |
463 | -- | 475 | Nikita Schmidt, Ahmed Patel. Rule-driven processing of tree-structured data using pointed trees |
477 | -- | 499 | Ho-Won Jung. Evaluating interrater agreement in SPICE-based assessments |
501 | -- | 513 | Chin-Chen Chang, Iuon-Chang Lin. The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture |
515 | -- | 528 | Cheng-Yuan Ku, Lain-Chyr Hwang, Hsin-Tzung Wu. Ping-pong flow control for ATM ABR traffic |
529 | -- | 537 | Zhanjun Chang, Song Mei, Zheng Gu, Jianqin Gu, Liangxiao Xia, Shuang Liang, Jiarui Lin. Realization of integration and working procedure on digital hospital information system |
539 | -- | 552 | Kyung Chang Lee, Hyun Hee Kim, Suk Lee. Development of performance model for calculation of communication delay in Profibus token passing protocol |
553 | -- | 561 | T. Ozkul, A. Al Homoud. Communication protocol for monitoring a large number of remotely distributed hazardous material detection devices |