Journal: Computer Standards & Interfaces

Volume 29, Issue 6

601 -- 604Yu-Fang Chung, Kuo-Hsuan Huang, Feipei Lai, Tzer-Shyong Chen. ID-based digital signature scheme on the elliptic curve cryptosystem
605 -- 613Tineke M. Egyedi. Standard-compliant, but incompatible?!
614 -- 625Emmanouil Vlastos, Ahmed Patel. An open source forensic tool to visualize digital evidence
626 -- 634Shin-Yuan Hung, Albert H. Huang, David C. Yen, Chia-Ming Chang. Comparing the task effectiveness of instant messaging and electronic mail for geographically dispersed teams in Taiwan
635 -- 646Angelo Furfaro, Libero Nigro. Timed verification of hierarchical communicating real-time state machines
647 -- 652Rongxing Lu, Zhenfu Cao, Haojin Zhu. An enhanced authenticated key agreement protocol for wireless mobile communication
653 -- 661Ho-Won Jung. Validating the external quality subcharacteristics of software products according to ISO/IEC 9126
662 -- 673Gianluca Cena, Ivan Cibrario Bertolotti, Adriano Valenzano. A socket interface for CAN devices

Volume 29, Issue 5

507 -- 512Xiao-Min Wang, Wen-Fang Zhang, Jia-Shu Zhang, Muhammad Khurram Khan. Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards
513 -- 520Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong-Hoon Lee. Efficient verifier-based password-authenticated key exchange in the three-party setting
521 -- 527Rongxing Lu, Zhenfu Cao, Licheng Wang, Congkai Sun. A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
528 -- 530Raphael C.-W. Phan. Reducing the exhaustive key search of the Data Encryption Standard (DES)
531 -- 545Min-Xiou Chen, Chen-Jui Peng, Ren-Hung Hwang. SSIP: Split a SIP session over multiple devices
546 -- 560J. Silvestre, V. Sempere. An architecture for flexible scheduling in Profibus networks
561 -- 570Ming-Shi Wang, Wei-Che Chen. A majority-voting based watermarking scheme for color image tamper detection and recovery
571 -- 579Cheng-Huang Tung. Key reduction of a Chinese phonetic input method by minimizing message ambiguity
580 -- 583Kyung-Ah Shim. Potential weaknesses of AuthA password-authenticated key agreement protocols
584 -- 600Yuting Zhang, Jianxin Liao, Xiaomin Zhu, Wei Wu, Jun Ma. Inter-working between SIMPLE and IMPS

Volume 29, Issue 4

413 -- 422Heng-Li Yang, Hsi-Chuan Ho. Emergent standard of knowledge management: Hybrid peer-to-peer knowledge management
423 -- 429Shiuh-Jeng Wang, Da-Yu Kao. Internet forensics on the basis of evidence gathering with Peep attacks
430 -- 443Ahyoung Sung, Byoungju Choi, Seokkyoo Shin. An interface test model for hardware-dependent software and embedded OS API of the embedded system
444 -- 448Raphael C.-W. Phan. Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks
449 -- 461Bostjan Vlaovic, Aleksander Vreze, Zmago Brezocnik, Tatjana Kapus. Automated generation of Promela model from SDL specification
462 -- 466Wang Wei-lan. Intelligent input software of Tibetan
467 -- 470Kyung-Ah Shim. Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions
471 -- 480Francisco Rodríguez-Henríquez, Daniel Ortiz Arroyo, Claudia García-Zamora. Yet another improvement over the Mu-Varadharajan e-voting protocol
481 -- 498José Raúl Romero, Antonio Vallecillo, Francisco Durán. Writing and executing ODP computational viewpoint specifications using Maude
499 -- 505Kemal Bicakci. One-time proxy signatures revisited

Volume 29, Issue 3

277 -- 288Dimitrios Lekkas, Diomidis Spinellis. Implementing regular cash with blind fixed-value electronic coins
289 -- 301Ram Dantu, Gabriel Clothier, Anuj Atri. EAP methods for wireless networks
302 -- 315Jung-Min Kim, Byoung-Il Choi, Hyo-Phil Shin, Hyoung-Joo Kim. A methodology for constructing of philosophy ontology based on philosophical texts
316 -- 324Suk Lee, Kyoung Nam Ha, Ji Hoon Park, Kyung Chang Lee, Gi Sig Byun, Hyung Ki Lee. NDIS-based virtual polling algorithm for IEEE 802.11b for guaranteeing the real-time requirements
325 -- 334Sinuhé Arroyo, Alistair Duke, José Manuel López Cobo, Miguel-Ángel Sicilia. A model-driven choreography conceptual framework
335 -- 342Lotfi Boussaid, Abdellatif Mtibaa, Mohamed Abid, Michel Paindavoine. A real-time shot cut detector: Hardware implementation
343 -- 354Eunjee Song, Shuxin Yin, Indrakshi Ray. Using UML to model relational database operations
355 -- 364Indrajit Ray, Junxing Zhang. Towards a new standard for allowing concurrency and ensuring consistency in revision control systems
365 -- 375Junxing Zhang, Indrajit Ray. Towards secure multi-sited transactional revision control systems
376 -- 386Ghassan Z. Qadah, Rani Taha. Electronic voting systems: Requirements, design, and implementation
387 -- 397Ivan Cibrario Bertolotti, Luca Durante, Paolo Maggi, Riccardo Sisto, Adriano Valenzano. Improving the security of industrial networks by means of formal verification
398 -- 412Aleksej Jerman Blazic, Tomaz Klobucar, Borka Dzonova-Jerman-Blazic. Long-term trusted preservation service using service interaction protocol and evidence records

Volume 29, Issue 2

143 -- 151Jae-dong Lee, Jae-Il Jung, Jae-Ho Lee, Jong-Gyu Hwang, Jin-Ho Hwang, Sung Un Kim. Verification and conformance test generation of communication protocol for railway signaling systems
152 -- 160Ahmed Patel, Muhammad J. Khan. Evaluation of service management algorithms in a distributed web search system
161 -- 173K. Q. Yan, S. C. Wang, C. P. Chang, J. S. Lin. A hybrid load balancing policy underlying grid computing environment
174 -- 183Kui Fu Chen. On the condition of four-parameter sine wave fitting
184 -- 190Kui Fu Chen, Yi-Ming Xue. Improving four-parameter sine wave fitting by normalization
191 -- 195Xiaoming Hu, Shangteng Huang. A novel proxy key generation protocol and its application
196 -- 204Latifur Khan. Standards for image annotation using Semantic Web
205 -- 215Monika Kapus-Kolar. Enhanced event structures: Towards a true concurrency semantics for E-LOTOS
216 -- 223Shiuh-Jeng Wang. Measures of retaining digital evidence to prosecute computer-based cyber-crimes
224 -- 228Jingwei Liu, Rong Sun, Weidong Kou, Xi Sun. The security analyses of RosettaNet in Grid
229 -- 237Tzungher Chen, Gwoboa Horng. A lightweight and anonymous copyright-protection protocol
238 -- 243Albert H. Huang, Shin-Yuan Hung, David C. Yen. An exploratory investigation of two internet-based communication modes
244 -- 253Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. A common criteria based security requirements engineering process for the development of secure information systems
254 -- 259Hung-Yu Chien, Che-Hao Chen. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards
260 -- 264Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena. Threshold key issuing in identity-based cryptosystems
265 -- 274Gülfem Isiklar, Gülçin Büyüközkan. Using a multi-criteria decision making approach to evaluate mobile phone alternatives
275 -- 0Rongxing Lu, Zhenfu Cao. Erratum to "Non-interactive deniable authentication protocol based on factoring"[Computer Standards & Interfaces 27 (2005) 401-405]

Volume 29, Issue 1

3 -- 4D. Petri, Sergio Rapuano. Introduction to special issue on ADC modelling and testing
5 -- 10F. Attivissimo, N. Giaquinto, M. Savino. Worst-case uncertainty measurement in ADC-based instruments
11 -- 18Michael Löhning, Gerhard Fettweis. The effects of aperture jitter and clock jitter in wideband ADCs
19 -- 30Bertan Bakkaloglu, Sayfe Kiaei, Bikram Chaudhuri. Delta-sigma (DeltaSigma) frequency synthesizers for wireless applications
31 -- 37Jean-Marie Janik, Vincent Fresnaud. A spectral approach to estimate the INL of A/D converter
39 -- 53Andrey Naumenko, Alain Wegmann. Formalization of the RM-ODP foundations based on the Triune Continuum Paradigm
54 -- 68Wen-Yau Liang, Chun-Che Huang, Horng-Fu Chuang. The design with object (DwO) approach to Web services composition
69 -- 81Brian Willard. UML for systems engineering
82 -- 85Muhammad Khurram Khan, Jiashu Zhang. Improving the security of a flexible biometrics remote user authentication scheme
86 -- 96Douglas Harris, Latifur Khan, Raymond Paul, Bhavani M. Thuraisingham. Standards for secure data sharing across organizations
97 -- 108Dustin Swallows, David C. Yen, J. Michael Tarn. XML and WML integration: An analysis and strategies for implementation to meet mobile commerce challenges
109 -- 124Min-Hyung Lee, Yeon-Seok Kim, Kyong-Ho Lee. Logical structure analysis: From HTML to XML
125 -- 131Der-Chyuan Lou, Hao-Kuan Tso, Jiang-Lung Liu. A copyright protection scheme for digital images using visual cryptography technique
132 -- 137Wei Lu, Hongtao Lu, Fu-Lai Chung. Novel robust image watermarking using difference correlation detector
138 -- 141Jian-jie Zhao, Jianzhong Zhang, Rong Zhao. A practical verifiable multi-secret sharing scheme