Journal: Computer Standards & Interfaces

Volume 31, Issue 4

613 -- 628Vassilios Peristeras, Konstantinos A. Tarabanis, Sotirios K. Goudos. Model-driven eGovernment interoperability: A review of the state of the art
629 -- 641Rongyu He, Guolei Zhao, Chaowen Chang, Hui Xie, Xi Qin, Zheng Qin. A PK-SIM card based end-to-end security framework for SMS
642 -- 647Mi Wen, Yanfei Zheng, Wen-jun Ye, Kefei Chen, Wei-Dong Qiu. A key management protocol with robust continuity for sensor networks
648 -- 652Daewan Han, Daesung Kwon. Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
653 -- 660Borut Jereb. Software describing attributes
661 -- 668Hwanyong Lee, Nakhoon Baek. AlexVG: An OpenVG implementation with SVG-Tiny support
669 -- 674Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen. Ring signature scheme for ECC-based anonymous signcryption
675 -- 684Mark Umberger, Iztok Humar, Andrej Kos, Joze Guna, Andrej Zemva, Janez Bester. The integration of home-automation and IPTV system and services
685 -- 692Tomaz Turk. Price aggregation in an end-to-end QoS provisioning
693 -- 698Arpit Mittal, Arijit Sengupta. Improvised layout of keypad entry system for mobile phones
699 -- 706Long-Sheng Li, Gwo-Chuan Lee, Wei-Zan Wang. A root-based strategy for constructing a clustered MANET in all-IP networks
707 -- 712Sherman S. M. Chow. Blind signature and ring signature schemes: Rehabilitation and attack
713 -- 722L. Y. Tseng, Y. H. Chin, S. C. Wang. The anatomy study of high performance task scheduling algorithm for Grid computing system
723 -- 728Jing Xu, Wen Tao Zhu, Dengguo Feng. An improved smart card based password authentication scheme with provable security
729 -- 739Chien-Ping Chang, Jen-Chun Lee, Yu Su, Ping S. Huang, Te-Ming Tu. Using empirical mode decomposition for iris recognition
740 -- 747Yung Fu Chang, C. S. Chen, Hao Zhou. Smart phone for mobile commerce
748 -- 756Yeu-Pong Lai, Ruan-Han Dai. The implementation guidance for practicing network isolation by referring to ISO-17799 standard
757 -- 762Ming-Shi Wang, Wei-Che Chen. A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography
763 -- 771Deepti Mishra, Alok Mishra. Simplified software inspection process in compliance with international standards
772 -- 778Chin-Chen Chang, Ting-Fang Cheng. An efficient proxy raffle protocol with anonymity-preserving
779 -- 786Aleksander Vreze, Bostjan Vlaovic, Zmago Brezocnik. Sdl2pml - Tool for automated generation of Promela model from SDL specification
787 -- 794Yu-An Ho, Yung-Kuan Chan, Hsien-Chu Wu, Yen-Ping Chu. High-capacity reversible data hiding in binary images using pattern substitution
795 -- 800Shiuh-Jeng Wang, Da-Yu Kao, Frank Fu-Yuan Huang. Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models
801 -- 811Sourour Karmani, Ridha Djemal, Rached Tourki. Efficient hardware architecture of 2D-scan-based wavelet watermarking for image and video
812 -- 815Eun-Kyung Ryu, Tsuyoshi Takagi. A hybrid approach for privacy-preserving RFID tags
816 -- 829Sedat Atmaca, Celal Ceken, Ismail Erturk. A new QoS-aware TDMA/FDD MAC protocol with multi-beam directional antennas
830 -- 845Shuo Ding. Protocol interoperability in mobile IP enabled mobile ad hoc networks
846 -- 855I-Ching Hsu, Yuan Kwei Tzeng, Der-Cheng Huang. OWL-L: An OWL-based language for Web resources links
856 -- 862Haeryong Park, Seongan Lim, Ikkwon Yie, Kitae Kim, Junghwan Song. Strong unforgeability in group signature schemes
863 -- 868Hao-Rung Chung, Wei-Chi Ku, Maw-Jinn Tsaur. Weaknesses and improvement of Wang et al. s remote user password authentication scheme for resource-limited environments