Journal: Computer Standards & Interfaces

Volume 31, Issue 6

1045 -- 1055Fenareti Lampathaki, Spiros Mouzakitis, George Gionis, Yannis Charalabidis, Dimitris Askounis. Business to business interoperability: A current review of XML data integration standards
1056 -- 1060Marko Hölbl, Tatjana Welzer. Two improved two-party identity-based authenticated key agreement protocols
1061 -- 1068Yu-Fang Chung, Tzer-Shyong Chen, Ming-Wei Lai. Efficient migration access control for mobile agents
1069 -- 1072Rajaram Ramasamy, Amutha Prabakar Muniyandi, M. Indra Devi. A new algorithm for encryption/decryption for field applications
1073 -- 1091Manuel Díaz, Daniel Garrido, Luis Llopis, José M. Troya. Designing distributed software with RT-CORBA and SDL
1092 -- 1097ZhenChao Zhu, Yuqing Zhang, Fengjiao Wang. An efficient and provable secure identity-based ring signcryption scheme
1098 -- 1107Hakjae Kim, Ryong Oh, Sungju Lee, Taesup Kim, SangJoon Lee, Yongwha Chung, Choong-Ho Cho. A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment
1108 -- 1117Hassina Nacer Talantikite, Djamil Aïssani, Nacer Boudjlida. Semantic annotations for web services discovery and composition
1118 -- 1123Han-Cheng Hsiang, Wei Kuan Shih. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
1124 -- 1130Eun Young Choi, Dong-Hoon Lee, Jong In Lim. Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
1131 -- 1142ChunLin Li, Layuan Li. Utility-based scheduling for grid computing under constraints of energy budget and deadline
1143 -- 1149Shih-Chieh Shie, Shinfeng D. Lin. Data hiding based on compressed VQ indices of images
1150 -- 1157Edward David Moreno, José Ivo Fernandes de Oliveira. Architectural impact of the SVG-based graphical components in web applications
1158 -- 1166Jeff Waters, Brenda J. Powers, Marion G. Ceruti. Global Interoperability Using Semantics, Standards, Science and Technology (GIS:::3:::T)
1167 -- 1174N. W. Lo, Kuo-Hui Yeh. Cryptanalysis of two three-party encrypted key exchange protocols
1175 -- 1181Geerten van de Kaa, Frank T. H. den Hartog, Henk Jan de Vries. Mapping standards for home networking
1182 -- 1189Kevin W. Hamlen, Vishwath Mohan, Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham. Exploiting an antivirus interface
1190 -- 1191Weiguo Zhang, Shuanggen Liu, Huawei Huang. An efficient implementation algorithm for generating de Bruijn sequences