Journal: Computer Standards & Interfaces

Volume 27, Issue 6

561 -- 578Borka Jerman-Blazic, Tomaz Klobucar. Privacy provision in e-learning standardized systems: status and improvements
579 -- 596Min-Huang Ho, Yue-Shan Chang, Kuang-Lee Li, Shyan-Ming Yuan. The Federated Forums based Integrated Biological Data Mining Broker
597 -- 620Francisco Durán, Manuel Roldán, Antonio Vallecillo. Using Maude to write and execute ODP information viewpoint specifications
621 -- 635Tzu-Laing (Bill) Tseng, Wen-Yau Liang, Chun-Che Huang, Tsung-Yu Chian. Applying genetic algorithm for the development of the components-based embedded system
637 -- 651Ridha Djemal, Ayoub Dhouib, Samuel Dellacherie, Rached Tourki. A novel formal verification approach for RTL hardware IP cores
653 -- 663F. J. Jiménez, J. De Frutos. Virtual instrument for measurement, processing data, and visualization of vibration patterns of piezoelectric devices
665 -- 678Gianluca Cena, Adriano Valenzano, Stefano Vitturi. Advances in automotive digital communications
679 -- 695Tatjana Kostic, Otto Preiss, Christian Frei. Understanding and using the IEC 61850: a case for meta-modelling

Volume 27, Issue 5

439 -- 443Ahmed Patel. Formal methods, techniques and tools for secure and reliable applications
445 -- 455Fabio Massacci, Marco Prest, Nicola Zannone. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
457 -- 466Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph. On a formal framework for security properties
467 -- 478Javier Lopez, José A. Montenegro, José Luis Vivas, Eiji Okamoto, Ed Dawson. Specification and design of advanced authentication and authorization services
479 -- 488Wenbo Mao. A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols
489 -- 499Javier Lopez, Juan J. Ortega, José M. Troya. Security protocols analysis: A SDL-based approach
501 -- 512Theodoros Balopoulos, Stefanos Gritzalis, Sokratis K. Katsikas. Specifying Privacy-Preserving Protocols in Typed MSR
513 -- 520Jimmy McGibney, Nikita Schmidt, Ahmed Patel. A service-centric model for intrusion detection in next-generation networks
521 -- 532Costas Lambrinoudakis, Stefanos Gritzalis, Petros Hatzopoulos, Athanassios N. Yannacopoulos, Sokratis K. Katsikas. A formal model for pricing information systems insurance contracts
533 -- 545Daniel Cvrcek, Václav Matyás Jr., Ahmed Patel. Evidence processing and privacy issues in evidence-based reputation systems
547 -- 560Stamatis Karnouskos. Security-enabled code deployment for heterogeneous networks

Volume 27, Issue 4

327 -- 328David C. Yen, David C. Chou. Editorial
329 -- 336Yung Fu Chang, C. S. Chen. Smart phone - the choice of client platform for mobile commerce
337 -- 346Changi Nam, Dong-Hoon Yang, Euehun Lee, Seongcheol Kim, Jeong-Hoon Kim. Effect of time of adoption on consumer preference for transport telematics services
347 -- 357Pruthikrai Mahatanankoon, H. Joseph Wen, Billy B. L. Lim. Consumer-based m-commerce: exploring consumer perception of mobile applications
359 -- 370Shin-Yuan Hung, Chia-Ming Chang. User acceptance of WAP services: test of competing theories
371 -- 381Hsin-Pin Fu, Tien-Hsiang Chang, Lon-Fon Shieh, Wen-Hsiung Wu. An implementation model for WEGS in WLAN applications: a Taiwanese case
383 -- 395Dong-Her Shih, Shin-Yi Huang, David C. Yen. A new reverse auction agent system for m-commerce using mobile agents
397 -- 400Qiang Tang, Chris J. Mitchell. Comments on two anonymous conference key distribution systems
401 -- 405Rongxing Lu, Zhenfu Cao. Non-interactive deniable authentication protocol based on factoring
407 -- 413Chin-Chen Chang, Iuon-Chang Lin, Kwok-Yan Lam. An ID-based multisignature scheme without reblocking and predetermined signing order
415 -- 422Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen. Design of a fair proxy raffle protocol on the Internet
423 -- 437Donna M. Evans, David C. Yen. Private key infrastructure: balancing computer transmission privacy with changing technology and security demands

Volume 27, Issue 3

191 -- 205Gusztáv Adamis, Róbert Horváth, Zoltán Pap, Katalin Tarnay. Standardized languages for telecommunication systems
207 -- 219Jae-Ho Lee, Jong-Gyu Hwang, Gwi-Tae Park. Performance evaluation and verification of communication protocol for railway signaling systems
221 -- 232Jeon Il Moon, Jung Sub Kim, Jong Bae Kim, Kye Young Lim, Byoung-Wook Choi. A hardware implementation of distributed network protocol
233 -- 240David C. Chou, Kirill Yurov. Security development in Web Services environment
241 -- 256Eric Jui-Lin Lu, Yi-Hui Chen. A flexible delegation processor for web-based information systems
257 -- 268Bhavani M. Thuraisingham. Security standards for the semantic web
269 -- 284Giorgos Gousios, Efthimia Aivaloglou, Stefanos Gritzalis. Distributed component architectures security issues
285 -- 301Y. C. Jiang, P. Yi, S. Y. Zhang, Y. P. Zhong. Constructing agents blackboard communication architecture based on graph theory
303 -- 312Shiang-Feng Tzeng, Min-Shiang Hwang, Hsing-Bai Chen. A secure on-line software transaction scheme
313 -- 322Ya-Fen Chang, Chin-Chen Chang, Jen-Ho Yang. An efficient password authenticated key exchange protocol for imbalanced wireless networks
323 -- 326Qiang Tang, Chris J. Mitchell. Comments on a cryptographic key assignment scheme

Volume 27, Issue 2

89 -- 100Adam Theiss, David C. Yen, Cheng-Yuan Ku. Global Positioning Systems: an analysis of applications, current development and future implementations
101 -- 104Ales Vobornik. Protection for software in measuring instruments
105 -- 115Zhi Wang, Xingfa Shen, Jiming Chen, Yeqiong Song, Tianran Wang, Youxian Sun. Real-time performance evaluation of urgent aperiodic messages in FF communication and its improvement
117 -- 132Tibor Gyires, H. Joseph Wen. Extension of Multiprotocol Label Switching for long-range dependent traffic: QoS routing and performance in IP networks
133 -- 147Goldie Gabrani, Tushar Mulkar. A quad-tree based algorithm for processor allocation in 2D mesh-connected multicomputers
149 -- 161Jiung-Yao Huang, Ming-Chih Tung, Kuei Min Wang, Ming-Che Lee. Smart Time Management - the unified time synchronization interface for the distributed simulation
163 -- 168Sheng-Yu Hwang, Hsiang-An Wen, Tzonelih Hwang. On the security enhancement for anonymous secure e-voting over computer network
169 -- 176Hui-Feng Huang, Chin-Chen Chang. Multisignatures with distinguished signing authorities for sequential and broadcasting architectures
177 -- 180Narn-Yih Lee, Yu-Chung Chiu. Improved remote authentication scheme with smart card
181 -- 183Sung-Woon Lee, Hyun-Sung Kim, Kee-Young Yoo. Improvement of Chien et al. s remote user authentication scheme using smart cards
185 -- 190Woo-Hun Kim, Eun-Kyung Ryu, Jae-Yuel Im, Kee-Young Yoo. New conference key agreement protocol with user anonymity

Volume 27, Issue 1

1 -- 18Goldie Gabrani. A distributed queue approach to resource locations in broadband distributed computing environments
19 -- 23Chu-Hsing Lin, Yi-Yi Lai. A flexible biometrics remote user authentication scheme
25 -- 31Tzungher Chen, Wei-Bin Lee, Gwoboa Horng. Secure SAS-like password authentication schemes
33 -- 38Tzer-Shyong Chen. A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem
39 -- 51Woei-Jiunn Tsaur, Chia Chun Wu, Wei-Bin Lee. A smart card-based remote scheme for password authentication in multi-server Internet services
53 -- 59Zuhua Shao. Improvement of threshold proxy signature scheme
61 -- 69Zuhua Shao. Improvement of digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem
71 -- 88M. Al-Rousan, S. Ahmed. Implementation of cache coherence protocol for COMA multiprocessor systems based on the scalable coherent interface