


default search action
Computer Standards & Interfaces, Volume 27
Volume 27, Number 1, November 2004
- Goldie Gabrani:

A distributed queue approach to resource locations in broadband distributed computing environments. 1-18 - Chu-Hsing Lin, Yi-Yi Lai:

A flexible biometrics remote user authentication scheme. 19-23 - Tzungher Chen

, Wei-Bin Lee, Gwoboa Horng
:
Secure SAS-like password authentication schemes. 25-31 - Tzer-Shyong Chen

:
A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem. 33-38 - Woei-Jiunn Tsaur, Chia Chun Wu, Wei-Bin Lee:

A smart card-based remote scheme for password authentication in multi-server Internet services. 39-51 - Zuhua Shao:

Improvement of threshold proxy signature scheme. 53-59 - Zuhua Shao:

Improvement of digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem. 61-69 - Mohammad A. Al-Rousan, S. Ahmed:

Implementation of cache coherence protocol for COMA multiprocessor systems based on the scalable coherent interface. 71-88
Volume 27, Number 2, January 2005
- Adam Theiss, David C. Yen

, Cheng-Yuan Ku:
Global Positioning Systems: an analysis of applications, current development and future implementations. 89-100 - Ales Vobornik:

Protection for software in measuring instruments. 101-104 - Zhi Wang, Xingfa Shen, Jiming Chen, Yeqiong Song

, Tianran Wang, Youxian Sun:
Real-time performance evaluation of urgent aperiodic messages in FF communication and its improvement. 105-115 - Tibor Gyires, H. Joseph Wen:

Extension of Multiprotocol Label Switching for long-range dependent traffic: QoS routing and performance in IP networks. 117-132 - Goldie Gabrani, Tushar Mulkar:

A quad-tree based algorithm for processor allocation in 2D mesh-connected multicomputers. 133-147 - Jiung-yao Huang, Ming-Chih Tung, Kuei Min Wang, Ming-Che Lee:

Smart Time Management - the unified time synchronization interface for the distributed simulation. 149-161 - Sheng-Yu Hwang, Hsiang-An Wen, Tzonelih Hwang:

On the security enhancement for anonymous secure e-voting over computer network. 163-168 - Hui-Feng Huang, Chin-Chen Chang:

Multisignatures with distinguished signing authorities for sequential and broadcasting architectures. 169-176 - Narn-Yih Lee, Yu-Chung Chiu:

Improved remote authentication scheme with smart card. 177-180 - Sung-Woon Lee, Hyun-Sung Kim

, Kee-Young Yoo:
Improvement of Chien et al.'s remote user authentication scheme using smart cards. 181-183 - Woo-Hun Kim, Eun-Kyung Ryu, Jae-Yuel Im, Kee-Young Yoo:

New conference key agreement protocol with user anonymity. 185-190
Volume 27, Number 3, March 2005
- Gusztáv Adamis, Róbert Horváth, Zoltán Pap, Katalin Tarnay:

Standardized languages for telecommunication systems. 191-205 - Jae-Ho Lee, Jong-Gyu Hwang, Gwi-Tae Park:

Performance evaluation and verification of communication protocol for railway signaling systems. 207-219 - Jeon Il Moon, Jung Sub Kim, Jong Bae Kim, Kye Young Lim, Byoung Wook Choi:

A hardware implementation of distributed network protocol. 221-232 - David C. Chou, Kirill M. Yurov:

Security development in Web Services environment. 233-240 - Eric Jui-Lin Lu, Yi-Hui Chen:

A flexible delegation processor for web-based information systems. 241-256 - Bhavani Thuraisingham:

Security standards for the semantic web. 257-268 - Giorgos Gousios

, Efthimia Aivaloglou, Stefanos Gritzalis:
Distributed component architectures security issues. 269-284 - Yichuan Jiang, P. Yi, Shiyong Zhang, Yiping Zhong:

Constructing agents blackboard communication architecture based on graph theory. 285-301 - Shiang-Feng Tzeng, Min-Shiang Hwang, Hsing-Bai Chen:

A secure on-line software transaction scheme. 303-312 - Ya-Fen Chang, Chin-Chen Chang, Jen-Ho Yang:

An efficient password authenticated key exchange protocol for imbalanced wireless networks. 313-322 - Qiang Tang

, Chris J. Mitchell
:
Comments on a cryptographic key assignment scheme. 323-326
Volume 27, Number 4, April 2005
- David C. Yen

, David C. Chou:
Editorial. 327-328 - Yung Fu Chang, C. S. Chen:

Smart phone - the choice of client platform for mobile commerce. 329-336 - Changi Nam, Dong-Hoon Yang, Euehun Lee, Seongcheol Kim, Jeong-Hoon Kim:

Effect of time of adoption on consumer preference for transport telematics services. 337-346 - Pruthikrai Mahatanankoon, H. Joseph Wen, Billy B. L. Lim:

Consumer-based m-commerce: exploring consumer perception of mobile applications. 347-357 - Shin-Yuan Hung, Chia-Ming Chang:

User acceptance of WAP services: test of competing theories. 359-370 - Hsin-Pin Fu, Tien-Hsiang Chang, Lon-Fon Shieh, Wen-Hsiung Wu:

An implementation model for WEGS in WLAN applications: a Taiwanese case. 371-381 - Dong-Her Shih, Shin-Yi Huang, David C. Yen

:
A new reverse auction agent system for m-commerce using mobile agents. 383-395 - Qiang Tang

, Chris J. Mitchell
:
Comments on two anonymous conference key distribution systems. 397-400 - Rongxing Lu, Zhenfu Cao

:
Non-interactive deniable authentication protocol based on factoring. 401-405 - Chin-Chen Chang, Iuon-Chang Lin, Kwok-Yan Lam:

An ID-based multisignature scheme without reblocking and predetermined signing order. 407-413 - Yu-Yi Chen, Jinn-ke Jan, Chin-Ling Chen:

Design of a fair proxy raffle protocol on the Internet. 415-422 - Donna M. Evans, David C. Yen

:
Private key infrastructure: balancing computer transmission privacy with changing technology and security demands. 423-437
Volume 27, Number 5, June 2005
- Ahmed Patel:

Formal methods, techniques and tools for secure and reliable applications. 439-443 - Fabio Massacci

, Marco Prest, Nicola Zannone
:
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation. 445-455 - Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph

:
On a formal framework for security properties. 457-466 - Javier López

, José A. Montenegro, José Luis Vivas, Eiji Okamoto, Ed Dawson
:
Specification and design of advanced authentication and authorization services. 467-478 - Wenbo Mao:

A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols. 479-488 - Javier López

, Juan J. Ortega
, José M. Troya:
Security protocols analysis: A SDL-based approach. 489-499 - Theodoros Balopoulos, Stefanos Gritzalis

, Sokratis K. Katsikas
:
Specifying Privacy-Preserving Protocols in Typed MSR. 501-512 - Jimmy McGibney, Nikita Schmidt, Ahmed Patel:

A service-centric model for intrusion detection in next-generation networks. 513-520 - Costas Lambrinoudakis

, Stefanos Gritzalis
, Petros Hatzopoulos, Athanasios N. Yannacopoulos
, Sokratis K. Katsikas
:
A formal model for pricing information systems insurance contracts. 521-532 - Daniel Cvrcek, Václav Matyás Jr., Ahmed Patel:

Evidence processing and privacy issues in evidence-based reputation systems. 533-545 - Stamatis Karnouskos

:
Security-enabled code deployment for heterogeneous networks. 547-560
Volume 27, Number 6, June 2005
- Borka Jerman-Blazic, Tomaz Klobucar

:
Privacy provision in e-learning standardized systems: status and improvements. 561-578 - Min-Huang Ho, Yue-Shan Chang, Kuang-Lee Li, Shyan-Ming Yuan

:
The Federated Forums based Integrated Biological Data Mining Broker. 579-596 - Francisco Durán

, Manuel Roldán, Antonio Vallecillo
:
Using Maude to write and execute ODP information viewpoint specifications. 597-620 - Tzu-Liang (Bill) Tseng, Wen-Yau Liang, Chun-Che Huang, Tsung-Yu Chian:

Applying genetic algorithm for the development of the components-based embedded system. 621-635 - Ridha Djemal, Ayoub Dhouib, Samuel Dellacherie, Rached Tourki:

A novel formal verification approach for RTL hardware IP cores. 637-651 - F. J. Jiménez, José De Frutos

:
Virtual instrument for measurement, processing data, and visualization of vibration patterns of piezoelectric devices. 653-663 - Gianluca Cena

, Adriano Valenzano, Stefano Vitturi
:
Advances in automotive digital communications. 665-678 - Tatjana Kostic, Otto Preiss, Christian Frei:

Understanding and using the IEC 61850: a case for meta-modelling. 679-695

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














