261 | -- | 271 | C. RodrÃguez-Morcillo, S. Alexandres, J. D. Muñoz. Broadband system to increase bitrate in train communication networks |
272 | -- | 276 | Hui-Feng Huang. A novel access control protocol for secure sensor networks |
277 | -- | 281 | Victor R. L. Shen, Yu-Fang Chung, Tzer-Shyong Chen. A novel application of grey system theory to information security (Part I) |
282 | -- | 285 | Wei Gao, Fei Li, Xueli Wang. Chameleon hash without key exposure based on Schnorr signature |
286 | -- | 291 | Liufei Wu, Yuqing Zhang, Fengjiao Wang. A new provably secure authentication and key agreement protocol for SIP using ECC |
292 | -- | 299 | Cheng-Huang Tung, En-Yih Jean. A modified phoneme-based Chinese input method for minimizing conflict code rate |
300 | -- | 304 | Yu-Fang Chung, Kuo-Hsuan Huang, Tzer-Shyong Chen. Threshold authenticated encryption scheme using labor-division signature |
305 | -- | 308 | Denis Trcek, Damjan Kovac. Formal apparatus for measurement of lightweight protocols |
309 | -- | 318 | Marta Rey-López, Rebeca P. Díaz Redondo, Ana Fernández Vilas, José J. Pazos Arias, Jorge García Duque, Alberto Gil-Solla, Manuel Ramos Cabrer. An extension to the ADL SCORM standard to support adaptivity: The t-learning case-study |
319 | -- | 320 | Chun-I Fan, D. J. Guan, Chih-I Wang, Dai-Rui Lin. Cryptanalysis of Lee-Hwang-Yang blind signature scheme |
321 | -- | 328 | Mafruz Zaman Ashrafi, See-Kiong Ng. Privacy-preserving e-payments using one-time payment details |
329 | -- | 335 | Der-Chyuan Lou, Ming-Chiang Hu, Jiang-Lung Liu. Multiple layer data hiding scheme for medical images |
336 | -- | 347 | Maria Ángeles Moraga, Coral Calero, Javier Garzás, Mario Piattini. Assessment of portlet quality: Collecting real experience |
348 | -- | 353 | Yong Yu, Chunxiang Xu, Xinyi Huang, Yi Mu. An efficient anonymous proxy signature scheme with provable security |
354 | -- | 361 | Ernesto Exposito, Mathieu Gineste, Laurent Dairaine, Christophe Chassot. Building self-optimized communication systems based on applicative cross-layer information |
362 | -- | 371 | Jae-Ho Lee, Jong-Gyu Hwang, Ducko Shin, Kang-Mi Lee, Sung Un Kim. Development of verification and conformance testing tools for a railway signaling communication protocol |
372 | -- | 380 | Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard |
381 | -- | 389 | Hao-Chuan Tsai, Chin-Chen Chang, Kai-Jie Chang. Roaming across wireless local area networks using SIM-based authentication protocol |
390 | -- | 394 | Hongzhen Du, Qiaoyan Wen. Efficient and provably-secure certificateless short signature scheme from bilinear pairings |
395 | -- | 400 | Jung-San Lee, Chin-Chen Chang. Design of electronic t-out-of-n lotteries on the Internet |
401 | -- | 405 | Kuo-Hsuan Huang, Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen. A conference key agreement protocol with fault-tolerant capability |
406 | -- | 419 | Tzu-Chi Huang, Ce-Kuen Shieh, Bo-Yang Lai, Yu-Ben Miao. Network Application Programming Interface over Session Initiation Protocol, a novel approach to the global roaming environment |
420 | -- | 427 | Der-Chyuan Lou, Chiang-Lung Liu, Chih-Lin Lin. Message estimation for universal steganalysis using multi-classification support vector machine |
428 | -- | 436 | S. Venkatesan, C. Chellappan. Generating routing table for free roaming mobile agent in distributed environment |
437 | -- | 453 | Yung-Wei Kao, Tzu-Han Kao, Chi-Yang Tsai, Shyan-Ming Yuan. A personal Web page tailoring toolkit for mobile devices |
454 | -- | 457 | Chunshan Shen, Fei Shen, ZhongCheng Wu, Jiarong Luo. Application of session initiation protocol to networked sensor interfaces |
458 | -- | 464 | Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang. Hiding data in spatial domain images with distortion tolerance |
465 | -- | 470 | Ki-Hyun Jung, Kee-Young Yoo. Data hiding method using image interpolation |
471 | -- | 479 | A. Téllez-Anguiano, F. Rivas-Cruz, Carlos M. Astorga-Zaragoza, E. Alcorta-García, David Juárez-Romero. Process control interface system for a distillation plant |
480 | -- | 483 | Haeryong Park, Seongan Lim, Ikkwon Yie. A privacy problem on Hu-Huang s proxy key generation protocol |
484 | -- | 498 | Pedro J. Muñoz Merino, Carlos Delgado Kloos, Jesús Fernández Naranjo. Enabling interoperability for LMS educational services |
499 | -- | 503 | Joydeb Roy Chowdury, Sayantica Pattanayak, A. K. Bhattacharjee. Design methodology for battery powered embedded systems - In safety critical application |
504 | -- | 514 | Rodrigo Palucci Pantoni, Dennis Brandão. Developing and implementing an open and non-proprietary device description for FOUNDATION fieldbus based on software standards |
515 | -- | 522 | S. R. Rossi, E. D. Moreno, A. A. de Carvalho, A. C. R. da Silva, E. A. Batista, T. A. Prado, T. A. Santos Filho. A VHDL-based protocol controller for NCAP processors |
523 | -- | 525 | Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng. Attack on a semi-blind watermarking scheme based on singular value decomposition |