613 | -- | 628 | Vassilios Peristeras, Konstantinos A. Tarabanis, Sotirios K. Goudos. Model-driven eGovernment interoperability: A review of the state of the art |
629 | -- | 641 | Rongyu He, Guolei Zhao, Chaowen Chang, Hui Xie, Xi Qin, Zheng Qin. A PK-SIM card based end-to-end security framework for SMS |
642 | -- | 647 | Mi Wen, Yanfei Zheng, Wen-jun Ye, Kefei Chen, Wei-Dong Qiu. A key management protocol with robust continuity for sensor networks |
648 | -- | 652 | Daewan Han, Daesung Kwon. Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards |
653 | -- | 660 | Borut Jereb. Software describing attributes |
661 | -- | 668 | Hwanyong Lee, Nakhoon Baek. AlexVG: An OpenVG implementation with SVG-Tiny support |
669 | -- | 674 | Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen. Ring signature scheme for ECC-based anonymous signcryption |
675 | -- | 684 | Mark Umberger, Iztok Humar, Andrej Kos, Joze Guna, Andrej Zemva, Janez Bester. The integration of home-automation and IPTV system and services |
685 | -- | 692 | Tomaz Turk. Price aggregation in an end-to-end QoS provisioning |
693 | -- | 698 | Arpit Mittal, Arijit Sengupta. Improvised layout of keypad entry system for mobile phones |
699 | -- | 706 | Long-Sheng Li, Gwo-Chuan Lee, Wei-Zan Wang. A root-based strategy for constructing a clustered MANET in all-IP networks |
707 | -- | 712 | Sherman S. M. Chow. Blind signature and ring signature schemes: Rehabilitation and attack |
713 | -- | 722 | L. Y. Tseng, Y. H. Chin, S. C. Wang. The anatomy study of high performance task scheduling algorithm for Grid computing system |
723 | -- | 728 | Jing Xu, Wen Tao Zhu, Dengguo Feng. An improved smart card based password authentication scheme with provable security |
729 | -- | 739 | Chien-Ping Chang, Jen-Chun Lee, Yu Su, Ping S. Huang, Te-Ming Tu. Using empirical mode decomposition for iris recognition |
740 | -- | 747 | Yung Fu Chang, C. S. Chen, Hao Zhou. Smart phone for mobile commerce |
748 | -- | 756 | Yeu-Pong Lai, Ruan-Han Dai. The implementation guidance for practicing network isolation by referring to ISO-17799 standard |
757 | -- | 762 | Ming-Shi Wang, Wei-Che Chen. A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography |
763 | -- | 771 | Deepti Mishra, Alok Mishra. Simplified software inspection process in compliance with international standards |
772 | -- | 778 | Chin-Chen Chang, Ting-Fang Cheng. An efficient proxy raffle protocol with anonymity-preserving |
779 | -- | 786 | Aleksander Vreze, Bostjan Vlaovic, Zmago Brezocnik. Sdl2pml - Tool for automated generation of Promela model from SDL specification |
787 | -- | 794 | Yu-An Ho, Yung-Kuan Chan, Hsien-Chu Wu, Yen-Ping Chu. High-capacity reversible data hiding in binary images using pattern substitution |
795 | -- | 800 | Shiuh-Jeng Wang, Da-Yu Kao, Frank Fu-Yuan Huang. Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models |
801 | -- | 811 | Sourour Karmani, Ridha Djemal, Rached Tourki. Efficient hardware architecture of 2D-scan-based wavelet watermarking for image and video |
812 | -- | 815 | Eun-Kyung Ryu, Tsuyoshi Takagi. A hybrid approach for privacy-preserving RFID tags |
816 | -- | 829 | Sedat Atmaca, Celal Ceken, Ismail Erturk. A new QoS-aware TDMA/FDD MAC protocol with multi-beam directional antennas |
830 | -- | 845 | Shuo Ding. Protocol interoperability in mobile IP enabled mobile ad hoc networks |
846 | -- | 855 | I-Ching Hsu, Yuan Kwei Tzeng, Der-Cheng Huang. OWL-L: An OWL-based language for Web resources links |
856 | -- | 862 | Haeryong Park, Seongan Lim, Ikkwon Yie, Kitae Kim, Junghwan Song. Strong unforgeability in group signature schemes |
863 | -- | 868 | Hao-Rung Chung, Wei-Chi Ku, Maw-Jinn Tsaur. Weaknesses and improvement of Wang et al. s remote user password authentication scheme for resource-limited environments |