143 | -- | 151 | Jae-dong Lee, Jae-Il Jung, Jae-Ho Lee, Jong-Gyu Hwang, Jin-Ho Hwang, Sung Un Kim. Verification and conformance test generation of communication protocol for railway signaling systems |
152 | -- | 160 | Ahmed Patel, Muhammad J. Khan. Evaluation of service management algorithms in a distributed web search system |
161 | -- | 173 | K. Q. Yan, S. C. Wang, C. P. Chang, J. S. Lin. A hybrid load balancing policy underlying grid computing environment |
174 | -- | 183 | Kui Fu Chen. On the condition of four-parameter sine wave fitting |
184 | -- | 190 | Kui Fu Chen, Yi-Ming Xue. Improving four-parameter sine wave fitting by normalization |
191 | -- | 195 | Xiaoming Hu, Shangteng Huang. A novel proxy key generation protocol and its application |
196 | -- | 204 | Latifur Khan. Standards for image annotation using Semantic Web |
205 | -- | 215 | Monika Kapus-Kolar. Enhanced event structures: Towards a true concurrency semantics for E-LOTOS |
216 | -- | 223 | Shiuh-Jeng Wang. Measures of retaining digital evidence to prosecute computer-based cyber-crimes |
224 | -- | 228 | Jingwei Liu, Rong Sun, Weidong Kou, Xi Sun. The security analyses of RosettaNet in Grid |
229 | -- | 237 | Tzungher Chen, Gwoboa Horng. A lightweight and anonymous copyright-protection protocol |
238 | -- | 243 | Albert H. Huang, Shin-Yuan Hung, David C. Yen. An exploratory investigation of two internet-based communication modes |
244 | -- | 253 | Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini. A common criteria based security requirements engineering process for the development of secure information systems |
254 | -- | 259 | Hung-Yu Chien, Che-Hao Chen. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards |
260 | -- | 264 | Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena. Threshold key issuing in identity-based cryptosystems |
265 | -- | 274 | Gülfem Isiklar, Gülçin Büyüközkan. Using a multi-criteria decision making approach to evaluate mobile phone alternatives |
275 | -- | 0 | Rongxing Lu, Zhenfu Cao. Erratum to "Non-interactive deniable authentication protocol based on factoring"[Computer Standards & Interfaces 27 (2005) 401-405] |