1045 | -- | 1055 | Fenareti Lampathaki, Spiros Mouzakitis, George Gionis, Yannis Charalabidis, Dimitris Askounis. Business to business interoperability: A current review of XML data integration standards |
1056 | -- | 1060 | Marko Hölbl, Tatjana Welzer. Two improved two-party identity-based authenticated key agreement protocols |
1061 | -- | 1068 | Yu-Fang Chung, Tzer-Shyong Chen, Ming-Wei Lai. Efficient migration access control for mobile agents |
1069 | -- | 1072 | Rajaram Ramasamy, Amutha Prabakar Muniyandi, M. Indra Devi. A new algorithm for encryption/decryption for field applications |
1073 | -- | 1091 | Manuel DÃaz, Daniel Garrido, Luis Llopis, José M. Troya. Designing distributed software with RT-CORBA and SDL |
1092 | -- | 1097 | ZhenChao Zhu, Yuqing Zhang, Fengjiao Wang. An efficient and provable secure identity-based ring signcryption scheme |
1098 | -- | 1107 | Hakjae Kim, Ryong Oh, Sungju Lee, Taesup Kim, SangJoon Lee, Yongwha Chung, Choong-Ho Cho. A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment |
1108 | -- | 1117 | Hassina Nacer Talantikite, Djamil Aïssani, Nacer Boudjlida. Semantic annotations for web services discovery and composition |
1118 | -- | 1123 | Han-Cheng Hsiang, Wei Kuan Shih. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment |
1124 | -- | 1130 | Eun Young Choi, Dong-Hoon Lee, Jong In Lim. Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems |
1131 | -- | 1142 | ChunLin Li, Layuan Li. Utility-based scheduling for grid computing under constraints of energy budget and deadline |
1143 | -- | 1149 | Shih-Chieh Shie, Shinfeng D. Lin. Data hiding based on compressed VQ indices of images |
1150 | -- | 1157 | Edward David Moreno, José Ivo Fernandes de Oliveira. Architectural impact of the SVG-based graphical components in web applications |
1158 | -- | 1166 | Jeff Waters, Brenda J. Powers, Marion G. Ceruti. Global Interoperability Using Semantics, Standards, Science and Technology (GIS:::3:::T) |
1167 | -- | 1174 | N. W. Lo, Kuo-Hui Yeh. Cryptanalysis of two three-party encrypted key exchange protocols |
1175 | -- | 1181 | Geerten van de Kaa, Frank T. H. den Hartog, Henk Jan de Vries. Mapping standards for home networking |
1182 | -- | 1189 | Kevin W. Hamlen, Vishwath Mohan, Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham. Exploiting an antivirus interface |
1190 | -- | 1191 | Weiguo Zhang, Shuanggen Liu, Huawei Huang. An efficient implementation algorithm for generating de Bruijn sequences |