Journal: Computer Standards & Interfaces

Volume 25, Issue 5

427 -- 430Harald Schumny. 25 volumes of Computer Standards and Interfaces completed
431 -- 436Zuhua Shao. Security of robust generalized MQV key agreement protocol without using one-way hash functions
437 -- 446Sean Lancaster, David C. Yen, Shi-Ming Huang. Public key infrastructure: a micro and macro analysis
447 -- 461Andrew Ren-Wei Fung, Kwo-Jean Farn, Abe C. Lin. Paper: a study on the certification of the information security management systems
463 -- 475Nikita Schmidt, Ahmed Patel. Rule-driven processing of tree-structured data using pointed trees
477 -- 499Ho-Won Jung. Evaluating interrater agreement in SPICE-based assessments
501 -- 513Chin-Chen Chang, Iuon-Chang Lin. The strategy of reducing the location update traffic using forwarding pointers in virtual layer architecture
515 -- 528Cheng-Yuan Ku, Lain-Chyr Hwang, Hsin-Tzung Wu. Ping-pong flow control for ATM ABR traffic
529 -- 537Zhanjun Chang, Song Mei, Zheng Gu, Jianqin Gu, Liangxiao Xia, Shuang Liang, Jiarui Lin. Realization of integration and working procedure on digital hospital information system
539 -- 552Kyung Chang Lee, Hyun Hee Kim, Suk Lee. Development of performance model for calculation of communication delay in Profibus token passing protocol
553 -- 561T. Ozkul, A. Al Homoud. Communication protocol for monitoring a large number of remotely distributed hazardous material detection devices