Journal: Computer Standards & Interfaces

Volume 31, Issue 2

261 -- 271C. Rodríguez-Morcillo, S. Alexandres, J. D. Muñoz. Broadband system to increase bitrate in train communication networks
272 -- 276Hui-Feng Huang. A novel access control protocol for secure sensor networks
277 -- 281Victor R. L. Shen, Yu-Fang Chung, Tzer-Shyong Chen. A novel application of grey system theory to information security (Part I)
282 -- 285Wei Gao, Fei Li, Xueli Wang. Chameleon hash without key exposure based on Schnorr signature
286 -- 291Liufei Wu, Yuqing Zhang, Fengjiao Wang. A new provably secure authentication and key agreement protocol for SIP using ECC
292 -- 299Cheng-Huang Tung, En-Yih Jean. A modified phoneme-based Chinese input method for minimizing conflict code rate
300 -- 304Yu-Fang Chung, Kuo-Hsuan Huang, Tzer-Shyong Chen. Threshold authenticated encryption scheme using labor-division signature
305 -- 308Denis Trcek, Damjan Kovac. Formal apparatus for measurement of lightweight protocols
309 -- 318Marta Rey-López, Rebeca P. Díaz Redondo, Ana Fernández Vilas, José J. Pazos Arias, Jorge García Duque, Alberto Gil-Solla, Manuel Ramos Cabrer. An extension to the ADL SCORM standard to support adaptivity: The t-learning case-study
319 -- 320Chun-I Fan, D. J. Guan, Chih-I Wang, Dai-Rui Lin. Cryptanalysis of Lee-Hwang-Yang blind signature scheme
321 -- 328Mafruz Zaman Ashrafi, See-Kiong Ng. Privacy-preserving e-payments using one-time payment details
329 -- 335Der-Chyuan Lou, Ming-Chiang Hu, Jiang-Lung Liu. Multiple layer data hiding scheme for medical images
336 -- 347Maria Ángeles Moraga, Coral Calero, Javier Garzás, Mario Piattini. Assessment of portlet quality: Collecting real experience
348 -- 353Yong Yu, Chunxiang Xu, Xinyi Huang, Yi Mu. An efficient anonymous proxy signature scheme with provable security
354 -- 361Ernesto Exposito, Mathieu Gineste, Laurent Dairaine, Christophe Chassot. Building self-optimized communication systems based on applicative cross-layer information
362 -- 371Jae-Ho Lee, Jong-Gyu Hwang, Ducko Shin, Kang-Mi Lee, Sung Un Kim. Development of verification and conformance testing tools for a railway signaling communication protocol
372 -- 380Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
381 -- 389Hao-Chuan Tsai, Chin-Chen Chang, Kai-Jie Chang. Roaming across wireless local area networks using SIM-based authentication protocol
390 -- 394Hongzhen Du, Qiaoyan Wen. Efficient and provably-secure certificateless short signature scheme from bilinear pairings
395 -- 400Jung-San Lee, Chin-Chen Chang. Design of electronic t-out-of-n lotteries on the Internet
401 -- 405Kuo-Hsuan Huang, Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen. A conference key agreement protocol with fault-tolerant capability
406 -- 419Tzu-Chi Huang, Ce-Kuen Shieh, Bo-Yang Lai, Yu-Ben Miao. Network Application Programming Interface over Session Initiation Protocol, a novel approach to the global roaming environment
420 -- 427Der-Chyuan Lou, Chiang-Lung Liu, Chih-Lin Lin. Message estimation for universal steganalysis using multi-classification support vector machine
428 -- 436S. Venkatesan, C. Chellappan. Generating routing table for free roaming mobile agent in distributed environment
437 -- 453Yung-Wei Kao, Tzu-Han Kao, Chi-Yang Tsai, Shyan-Ming Yuan. A personal Web page tailoring toolkit for mobile devices
454 -- 457Chunshan Shen, Fei Shen, ZhongCheng Wu, Jiarong Luo. Application of session initiation protocol to networked sensor interfaces
458 -- 464Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang. Hiding data in spatial domain images with distortion tolerance
465 -- 470Ki-Hyun Jung, Kee-Young Yoo. Data hiding method using image interpolation
471 -- 479A. Téllez-Anguiano, F. Rivas-Cruz, Carlos M. Astorga-Zaragoza, E. Alcorta-García, David Juárez-Romero. Process control interface system for a distillation plant
480 -- 483Haeryong Park, Seongan Lim, Ikkwon Yie. A privacy problem on Hu-Huang s proxy key generation protocol
484 -- 498Pedro J. Muñoz Merino, Carlos Delgado Kloos, Jesús Fernández Naranjo. Enabling interoperability for LMS educational services
499 -- 503Joydeb Roy Chowdury, Sayantica Pattanayak, A. K. Bhattacharjee. Design methodology for battery powered embedded systems - In safety critical application
504 -- 514Rodrigo Palucci Pantoni, Dennis Brandão. Developing and implementing an open and non-proprietary device description for FOUNDATION fieldbus based on software standards
515 -- 522S. R. Rossi, E. D. Moreno, A. A. de Carvalho, A. C. R. da Silva, E. A. Batista, T. A. Prado, T. A. Santos Filho. A VHDL-based protocol controller for NCAP processors
523 -- 525Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng. Attack on a semi-blind watermarking scheme based on singular value decomposition