Journal: ITC

Volume 42, Issue 4

303 -- 308Aleksas Riskus, Giedrius Liutkus. An Improved Algorithm for the Approximation of a Cubic Bezier Curve and its Application for Approximating Quadratic Bezier Curve
309 -- 314Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu. Efficient Proxy Signature Scheme for Mobile Devices from Bilinear Pairings
315 -- 324Jen-Ho Yang, Ya-Fen Chang, Yi-Hui Chen. An Efficient Authenticated Encryption Scheme Based on ECC and its Application for Electronic Payment
325 -- 332Irma Ivanoviene, Jonas Rimas. The Use of the Lambert Function Method for Analysis of a Control System with Delays
333 -- 342Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari. An Enhanced Authenticated Key Agreement for Session Initiation Protocol
343 -- 352J. C. Galan-Hernandez, Vicente Alarcón Aquino, Juan Manuel Ramírez-Cortés, Oleg Starostenko. Region-of-Interest Coding based on Fovea and Hierarchical Trees
353 -- 361Olga Kurasova, Tomas Petkus, Ernestas Filatovas. Visualization of Pareto Front Points when Solving Multi-objective Optimization Problems
362 -- 368Vacius Jusas, Tomas Neverdauskas. Combining Software and Hardware Test Generation Methods to Verify VHDL Models
369 -- 379Chin-Ling Chen, Wei-Chen Tsai, Yu-Yi Chen, Woei-Jiunn Tsaur. Using a Stored-Value Card to Provide an Added-Value Service of Payment Protocol in VANET
380 -- 392Nemanja Nedic, Goran Svenda. Workflow Management System for DMS

Volume 42, Issue 3

217 -- 230Andrius Blazinskas, Antanas Lenkevicius, Alfonsas Misevicius. Modified Local Search Heuristics for the Symmetric Traveling Salesman Problem
231 -- 237Qi Xie, Na Dong, Xiao Tan, Duncan S. Wong, Guilin Wang. Improvement of a Three-Party Password-Based Key Exchange Protocol with Formal Verification
238 -- 241Darius Birvinskas, Vacius Jusas, Ignas Martisius, Robertas Damasevicius. Data compression of EEG signals for artificial neural network classification
242 -- 246Saralees Nadarajah, Jungsoo Woo. On the maximum and minimum of multivariate Pareto random variables
247 -- 252Cheng-Chi Lee, Yan-Ming Lai, Chin-Ling Chen, Lung Albert Chen. A Novel Designated Verifier Signature Scheme Based on Bilinear Pairing
253 -- 259Ruslan Pacevic, Darius Markauskas, Lukas Radvilavicius, Arnas Kaceniauskas, Remigijus Kutas. Cell Attribute-Based Algorithm for Crack Visualization
260 -- 267Algimantas Venckauskas, Nerijus Morkevicius, Grigas Petraitis, Jonas Ceponis. Covert Channel for Cluster-based File Systems Using Multiple Cover Files
268 -- 276Han-Yu Lin. Secure Universal Designated Verifier Signature and its Variant for Privacy Protection
277 -- 285Zoran H. Peric, Jelena Lukic, Jelena Nikolic, Dragan B. Denic. Application of Mean-Square Approximation for Piecewise Linear Optimal Compander Design for Gaussian Source and Gaussian Mixture Model
286 -- 291Milan Sigmund. Statistical Analysis of Fundamental Frequency Based Features in Speech under Stress

Volume 42, Issue 2

105 -- 112Debiao He, Ding Wang, Shuhua Wu. Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
113 -- 123Qi Jiang, Jianfeng Ma, Guangsong Li, Zhuo Ma. An Improved Password-Based Remote User Authentication Protocol without Smart Cards
124 -- 130Wen-Chung Kuo, Bae-Ling Chen, Lih-Chyau Wuu. Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy
131 -- 149Sarunas Packevicius, Greta Krivickaite, Dominykas Barisas, Robertas Jasaitis, Tomas Blazauskas, Evaldas Guogis. Test Data Generation for Complex Data Types Using Imprecise Model Constraints and Constraint Solving Techniques
150 -- 158Tomas Skersys, Rimantas Butleris, Kestutis Kapocius, Tomas Vileiniskis. An Approach for Extracting Business Vocabularies from Business Process Models
159 -- 169Yuh-Min Tseng, Tung-Tso Tsai, Tsu-Yang Wu. Efficient Revocable Multi-Receiver ID-Based Encryption
170 -- 177Cheng-Yu Yeh, Kuan-Lin Chen, Shaw-Hwa Hwang. Consistency Analysis of the Duration Parameter Within a Syllable for Mandarin Speech
178 -- 190Stefan Miskovic, Zorica Stanimirovic. A Memetic Algorithm for Solving Two Variants of the Two-Stage Uncapacitated Facility Location Problem
191 -- 204Haiyan Sun, Qiaoyan Wen, Hua Zhang, Zhengping Jin. A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices

Volume 42, Issue 1

7 -- 14Lukás Sekanina, Richard Ruzicka, Zdenek Vasícek, Vaclav Simek, Petr Hanácek. Implementing A Unique Chip Id On A Reconfigurable Polymorphic Circuit
15 -- 20Donatas Levisauskas, Tomas Tekorius. An Approach To Identification Of Dynamic Model For Optimization Of Fed-Batch Fermentation Processes
21 -- 28Zuowen Tan. An Enhanced ID-based Authenticated Multiple Key Agreement Protocol
29 -- 37Raimundas Liutkevicius, Andrius Davidsonas. Surface Reconstruction From Partially Structured Noisy Cloud Of Points Using B-Splines
38 -- 47Uros Kac, Franc Novak. Reconfiguration Schemes Of SC Biquad Filters For Oscillation Based Test
48 -- 60Saulius Pavalkis, Lina Nemuraite, Rita Butkiene. Derived Properties: A User Friendly Approach To Improving Model Traceability
61 -- 66Chou Chen Yang, Ting Yi Chang, Min-Shiang Hwang. A New Group Signature Scheme Based on RSA Assumption
67 -- 76Alireza Fatehi, Behnaneh Sadeghpour, Batool Labibi. Nonlinear System Identification in Frequent and Infrequent Operating Points for Nonlinear Model Predictive Control
77 -- 85Iztok Fister Jr., Tomaz Kosar, Iztok Fister, Marjan Mernik. Easytime++: A Case Study Of Incremental Domain-Specific Language Development
86 -- 93Pedro J. García-Laencina. Improving Predictions Using Linear Combination Of Multiple Extreme Learning Machines