Journal: Computer Standards & Interfaces

Volume 31, Issue 6

1045 -- 1055Fenareti Lampathaki, Spiros Mouzakitis, George Gionis, Yannis Charalabidis, Dimitris Askounis. Business to business interoperability: A current review of XML data integration standards
1056 -- 1060Marko Hölbl, Tatjana Welzer. Two improved two-party identity-based authenticated key agreement protocols
1061 -- 1068Yu-Fang Chung, Tzer-Shyong Chen, Ming-Wei Lai. Efficient migration access control for mobile agents
1069 -- 1072Rajaram Ramasamy, Amutha Prabakar Muniyandi, M. Indra Devi. A new algorithm for encryption/decryption for field applications
1073 -- 1091Manuel Díaz, Daniel Garrido, Luis Llopis, José M. Troya. Designing distributed software with RT-CORBA and SDL
1092 -- 1097ZhenChao Zhu, Yuqing Zhang, Fengjiao Wang. An efficient and provable secure identity-based ring signcryption scheme
1098 -- 1107Hakjae Kim, Ryong Oh, Sungju Lee, Taesup Kim, SangJoon Lee, Yongwha Chung, Choong-Ho Cho. A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment
1108 -- 1117Hassina Nacer Talantikite, Djamil Aïssani, Nacer Boudjlida. Semantic annotations for web services discovery and composition
1118 -- 1123Han-Cheng Hsiang, Wei Kuan Shih. Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
1124 -- 1130Eun Young Choi, Dong-Hoon Lee, Jong In Lim. Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
1131 -- 1142ChunLin Li, Layuan Li. Utility-based scheduling for grid computing under constraints of energy budget and deadline
1143 -- 1149Shih-Chieh Shie, Shinfeng D. Lin. Data hiding based on compressed VQ indices of images
1150 -- 1157Edward David Moreno, José Ivo Fernandes de Oliveira. Architectural impact of the SVG-based graphical components in web applications
1158 -- 1166Jeff Waters, Brenda J. Powers, Marion G. Ceruti. Global Interoperability Using Semantics, Standards, Science and Technology (GIS:::3:::T)
1167 -- 1174N. W. Lo, Kuo-Hui Yeh. Cryptanalysis of two three-party encrypted key exchange protocols
1175 -- 1181Geerten van de Kaa, Frank T. H. den Hartog, Henk Jan de Vries. Mapping standards for home networking
1182 -- 1189Kevin W. Hamlen, Vishwath Mohan, Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham. Exploiting an antivirus interface
1190 -- 1191Weiguo Zhang, Shuanggen Liu, Huawei Huang. An efficient implementation algorithm for generating de Bruijn sequences

Volume 31, Issue 5

869 -- 0Irfan Awan, Qun Jin, Kuo-Ming Chao. Specification, standards and information management for distributed systems
870 -- 885Andrew Flahive, David Taniar, J. Wenny Rahayu, Bernady O. Apduhan. Ontology tailoring in the Semantic Grid
886 -- 893Fatos Xhafa, Leonard Barolli, Thanasis Daradoumis, Raul Fernandez, Santi Caballé. Jxta-Overlay: An interface for efficient peer selection in P2P JXTA-based systems
894 -- 905Musbah Shahop Sagar, David A. Duce, Muhammad Younas. The Oea framework for class-based object-oriented style JavaScript for web programming
906 -- 912Tomoya Enokido, Valbona Barolli, Makoto Takizawa. A legal information flow (LIF) scheduler based on role-based access control model
913 -- 930Salvatore Vitabile, Vincenzo Conti, Carmelo Militello, Filippo Sorbello. An extended JADE-S based framework for developing secure Multi-Agent Systems
931 -- 941Kemal Bicakci, Bulent Tavli. Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
942 -- 947Monika Kapus-Kolar. Reversible enhanced event structures: Towards reversible E-LOTOS
948 -- 953Minghui Zheng, Hui-Hua Zhou, Jun Li, Guohua Cui. Efficient and provably secure password-based group key agreement protocol
954 -- 961Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano. Tools for cryptographic protocols analysis: A technical and experimental comparison
962 -- 968Daniel Belega, Dominique Dallet. Choice of the acquisition parameters for frequency estimation of a sine wave by interpolated DFT method
969 -- 983Juan Trujillo, Emilio Soler, Eduardo Fernández-Medina, Mario Piattini. A UML 2.0 profile to define security requirements for Data Warehouses
984 -- 993Cihan Sahin, Emine Dogru Bolat. Development of remote control and monitoring of web-based distributed OPC system
994 -- 1001Jin Wang, Huai-Jiang Sun. A new evidential trust model for open communities
1002 -- 1013Gaurav Bhatnagar, Balasubramanian Raman. A new robust reference watermarking scheme based on DWT-SVD
1014 -- 1027Luis Álvarez Sabucedo, Luis E. Anido-Rifón, Ruben Míguez Pérez, Juan M. Santos-Gago. Providing standard-oriented data models and interfaces to eGovernment services: A semantic-driven approach
1028 -- 1035Eric Jui-Lin Lu, Chin-Ju Hsieh. A relation metadata extension for SCORM Content Aggregation Model
1036 -- 1043David C. Chou, Amy Y. Chou. Information systems outsourcing life cycle and risks analysis

Volume 31, Issue 4

613 -- 628Vassilios Peristeras, Konstantinos A. Tarabanis, Sotirios K. Goudos. Model-driven eGovernment interoperability: A review of the state of the art
629 -- 641Rongyu He, Guolei Zhao, Chaowen Chang, Hui Xie, Xi Qin, Zheng Qin. A PK-SIM card based end-to-end security framework for SMS
642 -- 647Mi Wen, Yanfei Zheng, Wen-jun Ye, Kefei Chen, Wei-Dong Qiu. A key management protocol with robust continuity for sensor networks
648 -- 652Daewan Han, Daesung Kwon. Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
653 -- 660Borut Jereb. Software describing attributes
661 -- 668Hwanyong Lee, Nakhoon Baek. AlexVG: An OpenVG implementation with SVG-Tiny support
669 -- 674Yu-Fang Chung, Zhen Yu Wu, Tzer-Shyong Chen. Ring signature scheme for ECC-based anonymous signcryption
675 -- 684Mark Umberger, Iztok Humar, Andrej Kos, Joze Guna, Andrej Zemva, Janez Bester. The integration of home-automation and IPTV system and services
685 -- 692Tomaz Turk. Price aggregation in an end-to-end QoS provisioning
693 -- 698Arpit Mittal, Arijit Sengupta. Improvised layout of keypad entry system for mobile phones
699 -- 706Long-Sheng Li, Gwo-Chuan Lee, Wei-Zan Wang. A root-based strategy for constructing a clustered MANET in all-IP networks
707 -- 712Sherman S. M. Chow. Blind signature and ring signature schemes: Rehabilitation and attack
713 -- 722L. Y. Tseng, Y. H. Chin, S. C. Wang. The anatomy study of high performance task scheduling algorithm for Grid computing system
723 -- 728Jing Xu, Wen Tao Zhu, Dengguo Feng. An improved smart card based password authentication scheme with provable security
729 -- 739Chien-Ping Chang, Jen-Chun Lee, Yu Su, Ping S. Huang, Te-Ming Tu. Using empirical mode decomposition for iris recognition
740 -- 747Yung Fu Chang, C. S. Chen, Hao Zhou. Smart phone for mobile commerce
748 -- 756Yeu-Pong Lai, Ruan-Han Dai. The implementation guidance for practicing network isolation by referring to ISO-17799 standard
757 -- 762Ming-Shi Wang, Wei-Che Chen. A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography
763 -- 771Deepti Mishra, Alok Mishra. Simplified software inspection process in compliance with international standards
772 -- 778Chin-Chen Chang, Ting-Fang Cheng. An efficient proxy raffle protocol with anonymity-preserving
779 -- 786Aleksander Vreze, Bostjan Vlaovic, Zmago Brezocnik. Sdl2pml - Tool for automated generation of Promela model from SDL specification
787 -- 794Yu-An Ho, Yung-Kuan Chan, Hsien-Chu Wu, Yen-Ping Chu. High-capacity reversible data hiding in binary images using pattern substitution
795 -- 800Shiuh-Jeng Wang, Da-Yu Kao, Frank Fu-Yuan Huang. Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models
801 -- 811Sourour Karmani, Ridha Djemal, Rached Tourki. Efficient hardware architecture of 2D-scan-based wavelet watermarking for image and video
812 -- 815Eun-Kyung Ryu, Tsuyoshi Takagi. A hybrid approach for privacy-preserving RFID tags
816 -- 829Sedat Atmaca, Celal Ceken, Ismail Erturk. A new QoS-aware TDMA/FDD MAC protocol with multi-beam directional antennas
830 -- 845Shuo Ding. Protocol interoperability in mobile IP enabled mobile ad hoc networks
846 -- 855I-Ching Hsu, Yuan Kwei Tzeng, Der-Cheng Huang. OWL-L: An OWL-based language for Web resources links
856 -- 862Haeryong Park, Seongan Lim, Ikkwon Yie, Kitae Kim, Junghwan Song. Strong unforgeability in group signature schemes
863 -- 868Hao-Rung Chung, Wei-Chi Ku, Maw-Jinn Tsaur. Weaknesses and improvement of Wang et al. s remote user password authentication scheme for resource-limited environments

Volume 31, Issue 3

527 -- 0Nitaigour-Premchand Mahalik. Guest Editorial
528 -- 538Francesco Basile, Pasquale Chiacchio, Domenico Del Grosso. A two-stage modelling architecture for distributed control of real-time industrial systems: Application of UML and Petri Net
539 -- 547Feng Xia, Youxian Sun, Yu-Chu Tian. Feedback scheduling of priority-driven control networks
548 -- 556Marek Miskowicz. Access delay in LonTalk MAC protocol
557 -- 565Jun Wang, Sijing Zhang, Carsten Maple, Zhengxu Zhao. Guaranteeing hard real-time traffic with legitimately short deadlines with the timed token protocol
566 -- 572Gianluca Cena, L. Seno, Adriano Valenzano, Stefano Vitturi. Performance analysis of Ethernet Powerlink networks for distributed control and automation systems
573 -- 578K. K. Tan, S. N. Huang, Y. Zhang, T. H. Lee. Distributed fault detection in industrial system based on sensor wireless network
579 -- 585Xianghui Cao, Jiming Chen, Youxian Sun. An interface designed for networked monitoring and control in wireless sensor networks
586 -- 598Nitaigour-Premchand Mahalik, Matthew Yen. Extending fieldbus standards to food processing and packaging industry: A review
599 -- 612Adnan Salihbegovic, Vlatko Marinkovic, Zoran Cico, Elvedin Karavdic, Nina Delic. Web based multilayered distributed SCADA/HMI system in refinery application

Volume 31, Issue 2

261 -- 271C. Rodríguez-Morcillo, S. Alexandres, J. D. Muñoz. Broadband system to increase bitrate in train communication networks
272 -- 276Hui-Feng Huang. A novel access control protocol for secure sensor networks
277 -- 281Victor R. L. Shen, Yu-Fang Chung, Tzer-Shyong Chen. A novel application of grey system theory to information security (Part I)
282 -- 285Wei Gao, Fei Li, Xueli Wang. Chameleon hash without key exposure based on Schnorr signature
286 -- 291Liufei Wu, Yuqing Zhang, Fengjiao Wang. A new provably secure authentication and key agreement protocol for SIP using ECC
292 -- 299Cheng-Huang Tung, En-Yih Jean. A modified phoneme-based Chinese input method for minimizing conflict code rate
300 -- 304Yu-Fang Chung, Kuo-Hsuan Huang, Tzer-Shyong Chen. Threshold authenticated encryption scheme using labor-division signature
305 -- 308Denis Trcek, Damjan Kovac. Formal apparatus for measurement of lightweight protocols
309 -- 318Marta Rey-López, Rebeca P. Díaz Redondo, Ana Fernández Vilas, José J. Pazos Arias, Jorge García Duque, Alberto Gil-Solla, Manuel Ramos Cabrer. An extension to the ADL SCORM standard to support adaptivity: The t-learning case-study
319 -- 320Chun-I Fan, D. J. Guan, Chih-I Wang, Dai-Rui Lin. Cryptanalysis of Lee-Hwang-Yang blind signature scheme
321 -- 328Mafruz Zaman Ashrafi, See-Kiong Ng. Privacy-preserving e-payments using one-time payment details
329 -- 335Der-Chyuan Lou, Ming-Chiang Hu, Jiang-Lung Liu. Multiple layer data hiding scheme for medical images
336 -- 347Maria Ángeles Moraga, Coral Calero, Javier Garzás, Mario Piattini. Assessment of portlet quality: Collecting real experience
348 -- 353Yong Yu, Chunxiang Xu, Xinyi Huang, Yi Mu. An efficient anonymous proxy signature scheme with provable security
354 -- 361Ernesto Exposito, Mathieu Gineste, Laurent Dairaine, Christophe Chassot. Building self-optimized communication systems based on applicative cross-layer information
362 -- 371Jae-Ho Lee, Jong-Gyu Hwang, Ducko Shin, Kang-Mi Lee, Sung Un Kim. Development of verification and conformance testing tools for a railway signaling communication protocol
372 -- 380Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard
381 -- 389Hao-Chuan Tsai, Chin-Chen Chang, Kai-Jie Chang. Roaming across wireless local area networks using SIM-based authentication protocol
390 -- 394Hongzhen Du, Qiaoyan Wen. Efficient and provably-secure certificateless short signature scheme from bilinear pairings
395 -- 400Jung-San Lee, Chin-Chen Chang. Design of electronic t-out-of-n lotteries on the Internet
401 -- 405Kuo-Hsuan Huang, Yu-Fang Chung, Hsiu-Hui Lee, Feipei Lai, Tzer-Shyong Chen. A conference key agreement protocol with fault-tolerant capability
406 -- 419Tzu-Chi Huang, Ce-Kuen Shieh, Bo-Yang Lai, Yu-Ben Miao. Network Application Programming Interface over Session Initiation Protocol, a novel approach to the global roaming environment
420 -- 427Der-Chyuan Lou, Chiang-Lung Liu, Chih-Lin Lin. Message estimation for universal steganalysis using multi-classification support vector machine
428 -- 436S. Venkatesan, C. Chellappan. Generating routing table for free roaming mobile agent in distributed environment
437 -- 453Yung-Wei Kao, Tzu-Han Kao, Chi-Yang Tsai, Shyan-Ming Yuan. A personal Web page tailoring toolkit for mobile devices
454 -- 457Chunshan Shen, Fei Shen, ZhongCheng Wu, Jiarong Luo. Application of session initiation protocol to networked sensor interfaces
458 -- 464Iuon-Chang Lin, Yang-Bin Lin, Chung-Ming Wang. Hiding data in spatial domain images with distortion tolerance
465 -- 470Ki-Hyun Jung, Kee-Young Yoo. Data hiding method using image interpolation
471 -- 479A. Téllez-Anguiano, F. Rivas-Cruz, Carlos M. Astorga-Zaragoza, E. Alcorta-García, David Juárez-Romero. Process control interface system for a distillation plant
480 -- 483Haeryong Park, Seongan Lim, Ikkwon Yie. A privacy problem on Hu-Huang s proxy key generation protocol
484 -- 498Pedro J. Muñoz Merino, Carlos Delgado Kloos, Jesús Fernández Naranjo. Enabling interoperability for LMS educational services
499 -- 503Joydeb Roy Chowdury, Sayantica Pattanayak, A. K. Bhattacharjee. Design methodology for battery powered embedded systems - In safety critical application
504 -- 514Rodrigo Palucci Pantoni, Dennis Brandão. Developing and implementing an open and non-proprietary device description for FOUNDATION fieldbus based on software standards
515 -- 522S. R. Rossi, E. D. Moreno, A. A. de Carvalho, A. C. R. da Silva, E. A. Batista, T. A. Prado, T. A. Santos Filho. A VHDL-based protocol controller for NCAP processors
523 -- 525Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng. Attack on a semi-blind watermarking scheme based on singular value decomposition

Volume 31, Issue 1

1 -- 5Tzungher Chen, Chin-Chen Chang, Chang-Sian Wu, Der-Chyuan Lou. On the security of a copyright protection scheme based on visual cryptography
6 -- 13Hyun Sook Rhee, Jeong Ok Kwon, Dong-Hoon Lee. A remote user authentication scheme without using smart cards
14 -- 18Sharat Kaushik. The software engineering model s categories of compliance
19 -- 23Xuan Hong, Kefei Chen. Secure multiple-times proxy signature scheme
24 -- 29Yi-Pin Liao, Shuenn-Shyang Wang. A secure dynamic ID based remote user authentication scheme for multi-server environment
30 -- 39Marco Cereia, Ivan Cibrario Bertolotti. Virtual machines for distributed real-time systems
40 -- 47Kuo-Hsuan Huang, Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen. Efficient migration for mobile computing in distributed networks
48 -- 55J. Michael Tarn, Chuan Pang, David C. Yen, Jon Chen. Exploring the implementation and application of Bluetooth technology in the shipping industry
56 -- 62Yong Yu, Bo Yang, Ying Sun, Shenglin Zhu. Identity based signcryption scheme without random oracles
63 -- 65Raphael Chung-Wei Phan. Cryptanalysis of the application secure alternative to SNMP (APSSNMP)
66 -- 76Jyh-Win Huang, Ting-Wei Hou. A controllable and accountable state-oriented Card-Aided Firewall
77 -- 87Monika Kapus-Kolar. An action refinement operator for E-LOTOS with true concurrency
88 -- 97Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda. LAMED - A PRNG for EPC Class-1 Generation-2 RFID specification
98 -- 109Haim Kilov, Ira Sack. Mechanisms for communication between business and IT experts
110 -- 119ChunLin Li, Layuan Li. An efficient coordination scheme between layers of grid architecture
120 -- 127Julian Proenza, José Miró-Julià, Hans Hansson. Managing redundancy in CAN-based networks supporting N-Version Programming
128 -- 136Yuh-Min Tseng. USIM-based EAP-TLS authentication protocol for wireless local area networks
137 -- 143Hyun-Sung Kim, Sung-Woon Lee. Area and time efficient AB:::2::: multipliers based on cellular automata
144 -- 152Gülçin Büyüközkan. Determining the mobile commerce user requirements using an analytic approach
153 -- 160Cemal Kocak, Ismail Erturk, Hüseyin Ekiz. MPLS over ATM and IP over ATM methods for multimedia applications
161 -- 168Suk Lee, Kyoung Nam Ha, Kyung Chang Lee. Performance evaluation of MAC layer of LnCP and LonWorks protocol as home networking system
169 -- 173Jianghong Hu, Jianzhong Zhang. Cryptanalysis and improvement of a threshold proxy signature scheme
174 -- 180Luis Guijarro. Semantic interoperability in eGovernment initiatives
181 -- 185Thulasi Goriparthi, Manik Lal Das, Ashutosh Saxena. An improved bilinear pairing based remote user authentication scheme
186 -- 191Elisardo González-Agulla, Enrique Otero Muras, Carmen García-Mateo, José Luis Alba-Castro. A multiplatform Java wrapper for the BioAPI framework
192 -- 208Jen-Chiun Lin, Kuo-Hsuan Huang, Feipei Lai, Hung-Chang Lee. Secure and efficient group key management with shared key derivation
209 -- 218Kuo-Qin Yan, Shu-Ching Wang, Mao-Lun Chiang, Lin Yu Tseng. A fuzzy-based Power-aware management for mobile ad hoc networks
219 -- 226Chien-Fu Cheng, Shu-Ching Wang, Tyne Liang. The anatomy study of server-initial agreement for general hierarchy wired/wireless networks
227 -- 245Heng-Li Yang, Chi-Lun Liu. A new standard of on-line customer service process: Integrating language-action into blogs
246 -- 251Antonio Izquierdo, José María Sierra, Joaquín Torres Márquez. An analysis of conformance issues in implementations of standardized security protocols
252 -- 257Rong Zhao, Jian-jie Zhao, Fang Dai, Feng-qun Zhao. A new image secret sharing scheme to identify cheaters
258 -- 260Ji-Seon Lee, Jik Hyun Chang. Comment on Saeednia et al. s strong designated verifier signature scheme