Journal: Computer Standards & Interfaces

Volume 29, Issue 5

507 -- 512Xiao-Min Wang, Wen-Fang Zhang, Jia-Shu Zhang, Muhammad Khurram Khan. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
513 -- 520Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong-Hoon Lee. Efficient verifier-based password-authenticated key exchange in the three-party setting
521 -- 527Rongxing Lu, Zhenfu Cao, Licheng Wang, Congkai Sun. A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
528 -- 530Raphael C.-W. Phan. Reducing the exhaustive key search of the Data Encryption Standard (DES)
531 -- 545Min-Xiou Chen, Chen-Jui Peng, Ren-Hung Hwang. SSIP: Split a SIP session over multiple devices
546 -- 560J. Silvestre, V. Sempere. An architecture for flexible scheduling in Profibus networks
561 -- 570Ming-Shi Wang, Wei-Che Chen. A majority-voting based watermarking scheme for color image tamper detection and recovery
571 -- 579Cheng-Huang Tung. Key reduction of a Chinese phonetic input method by minimizing message ambiguity
580 -- 583Kyung-Ah Shim. Potential weaknesses of AuthA password-authenticated key agreement protocols
584 -- 600Yuting Zhang, Jianxin Liao, Xiaomin Zhu, Wei Wu, Jun Ma. Inter-working between SIMPLE and IMPS