![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/csi/csi29.bht:"
@article{DBLP:journals/csi/ArroyoDCS07, author = {Sinuh{\'{e}} Arroyo and Alistair Duke and Jos{\'{e}} Manuel L{\'{o}}pez Cobo and Miguel{-}{\'{A}}ngel Sicilia}, title = {A model-driven choreography conceptual framework}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {325--334}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.05.004}, doi = {10.1016/J.CSI.2006.05.004}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ArroyoDCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/AttivissimoGS07, author = {Filippo Attivissimo and Nicola Giaquinto and Mario Savino}, title = {Worst-case uncertainty measurement in ADC-based instruments}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {5--10}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2005.12.002}, doi = {10.1016/J.CSI.2005.12.002}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/AttivissimoGS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/BakkalogluKC07, author = {Bertan Bakkaloglu and Sayfe Kiaei and Bikram Chaudhuri}, title = {Delta-sigma (DeltaSigma) frequency synthesizers for wireless applications}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {19--30}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2005.12.003}, doi = {10.1016/J.CSI.2005.12.003}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/BakkalogluKC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/BertolottiDMSV07, author = {Ivan Cibrario Bertolotti and Luca Durante and Paolo Maggi and Riccardo Sisto and Adriano Valenzano}, title = {Improving the security of industrial networks by means of formal verification}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {387--397}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.06.002}, doi = {10.1016/J.CSI.2006.06.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/BertolottiDMSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Bicakci07, author = {Kemal Bicakci}, title = {One-time proxy signatures revisited}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {4}, pages = {499--505}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.12.001}, doi = {10.1016/J.CSI.2006.12.001}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/Bicakci07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/BlazicKD07, author = {Aleksej Jerman Blazic and Tomaz Klobucar and Borka Dzonova{-}Jerman{-}Blazic}, title = {Long-term trusted preservation service using service interaction protocol and evidence records}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {398--412}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.06.004}, doi = {10.1016/J.CSI.2006.06.004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/BlazicKD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/BoussaidMAP07, author = {Lotfi Boussaid and Abdellatif Mtibaa and Mohamed Abid and Michel Paindavoine}, title = {A real-time shot cut detector: Hardware implementation}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {335--342}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.05.009}, doi = {10.1016/J.CSI.2006.05.009}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/BoussaidMAP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/CenaBV07, author = {Gianluca Cena and Ivan Cibrario Bertolotti and Adriano Valenzano}, title = {A socket interface for {CAN} devices}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {6}, pages = {662--673}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2007.07.004}, doi = {10.1016/J.CSI.2007.07.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/CenaBV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Chen07, author = {Kui Fu Chen}, title = {On the condition of four-parameter sine wave fitting}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {174--183}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.03.004}, doi = {10.1016/J.CSI.2006.03.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Chen07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ChenH07, author = {Tzungher Chen and Gwoboa Horng}, title = {A lightweight and anonymous copyright-protection protocol}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {229--237}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.03.010}, doi = {10.1016/J.CSI.2006.03.010}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ChenH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ChenPH07, author = {Min{-}Xiou Chen and Chen{-}Jui Peng and Ren{-}Hung Hwang}, title = {{SSIP:} Split a {SIP} session over multiple devices}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {531--545}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.008}, doi = {10.1016/J.CSI.2006.11.008}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/ChenPH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ChenX07, author = {Kui Fu Chen and Yi{-}Ming Xue}, title = {Improving four-parameter sine wave fitting by normalization}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {184--190}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.05.005}, doi = {10.1016/J.CSI.2006.05.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ChenX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ChienC07, author = {Hung{-}Yu Chien and Che{-}Hao Chen}, title = {Mutual authentication protocol for {RFID} conforming to {EPC} Class 1 Generation 2 standards}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {254--259}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.04.004}, doi = {10.1016/J.CSI.2006.04.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ChienC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ChungHLC07, author = {Yu{-}Fang Chung and Kuo{-}Hsuan Huang and Feipei Lai and Tzer{-}Shyong Chen}, title = {ID-based digital signature scheme on the elliptic curve cryptosystem}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {6}, pages = {601--604}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2007.01.004}, doi = {10.1016/J.CSI.2007.01.004}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/ChungHLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/DantuCA07, author = {Ram Dantu and Gabriel Clothier and Anuj Atri}, title = {{EAP} methods for wireless networks}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {289--301}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.04.001}, doi = {10.1016/J.CSI.2006.04.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/DantuCA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Egyedi07, author = {Tineke M. Egyedi}, title = {Standard-compliant, but incompatible?!}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {6}, pages = {605--613}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2007.04.001}, doi = {10.1016/J.CSI.2007.04.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Egyedi07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/FurfaroN07, author = {Angelo Furfaro and Libero Nigro}, title = {Timed verification of hierarchical communicating real-time state machines}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {6}, pages = {635--646}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2007.04.003}, doi = {10.1016/J.CSI.2007.04.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/FurfaroN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/GangishettiGDS07, author = {Raju Gangishetti and M. Choudary Gorantla and Manik Lal Das and Ashutosh Saxena}, title = {Threshold key issuing in identity-based cryptosystems}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {260--264}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.05.001}, doi = {10.1016/J.CSI.2006.05.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/GangishettiGDS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/HarrisKPT07, author = {Douglas Harris and Latifur Khan and Raymond Paul and Bhavani Thuraisingham}, title = {Standards for secure data sharing across organizations}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {86--96}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.01.004}, doi = {10.1016/J.CSI.2006.01.004}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/HarrisKPT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/HuH07, author = {Xiaoming Hu and Shangteng Huang}, title = {A novel proxy key generation protocol and its application}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {191--195}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.03.005}, doi = {10.1016/J.CSI.2006.03.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/HuH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/HuangHY07, author = {Albert H. Huang and Shin{-}Yuan Hung and David C. Yen}, title = {An exploratory investigation of two internet-based communication modes}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {238--243}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.03.011}, doi = {10.1016/J.CSI.2006.03.011}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/HuangHY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/HungHYC07, author = {Shin{-}Yuan Hung and Albert H. Huang and David C. Yen and Chia{-}Ming Chang}, title = {Comparing the task effectiveness of instant messaging and electronic mail for geographically dispersed teams in Taiwan}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {6}, pages = {626--634}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2007.03.001}, doi = {10.1016/J.CSI.2007.03.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/HungHYC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/IsiklarB07, author = {G{\"{u}}lfem Isiklar and G{\"{u}}l{\c{c}}in B{\"{u}}y{\"{u}}k{\"{o}}zkan}, title = {Using a multi-criteria decision making approach to evaluate mobile phone alternatives}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {265--274}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.05.002}, doi = {10.1016/J.CSI.2006.05.002}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/IsiklarB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/JanikF07, author = {Jean{-}Marie Janik and Vincent Fresnaud}, title = {A spectral approach to estimate the {INL} of {A/D} converter}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {31--37}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2005.12.004}, doi = {10.1016/J.CSI.2005.12.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/JanikF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Jung07, author = {Ho{-}Won Jung}, title = {Validating the external quality subcharacteristics of software products according to {ISO/IEC} 9126}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {6}, pages = {653--661}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2007.03.004}, doi = {10.1016/J.CSI.2007.03.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/Jung07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Kapus-Kolar07, author = {Monika Kapus{-}Kolar}, title = {Enhanced event structures: Towards a true concurrency semantics for {E-LOTOS}}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {205--215}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.03.007}, doi = {10.1016/J.CSI.2006.03.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Kapus-Kolar07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Khan07, author = {Latifur Khan}, title = {Standards for image annotation using Semantic Web}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {196--204}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.03.006}, doi = {10.1016/J.CSI.2006.03.006}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/Khan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/KhanZ07, author = {Muhammad Khurram Khan and Jiashu Zhang}, title = {Improving the security of 'a flexible biometrics remote user authentication scheme'}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {82--85}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.01.002}, doi = {10.1016/J.CSI.2006.01.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/KhanZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/KimCSK07, author = {Jung{-}Min Kim and Byoung{-}Il Choi and Hyo{-}Phil Shin and Hyoung{-}Joo Kim}, title = {A methodology for constructing of philosophy ontology based on philosophical texts}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {302--315}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.04.003}, doi = {10.1016/J.CSI.2006.04.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/KimCSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/KwonJSL07, author = {Jeong Ok Kwon and Ik Rae Jeong and Kouichi Sakurai and Dong Hoon Lee}, title = {Efficient verifier-based password-authenticated key exchange in the three-party setting}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {513--520}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.12.002}, doi = {10.1016/J.CSI.2006.12.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/KwonJSL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LeeHPLBL07, author = {Suk Lee and Kyoung Nam Ha and Ji Hoon Park and Kyung Chang Lee and Gi Sig Byun and Hyung Ki Lee}, title = {NDIS-based virtual polling algorithm for {IEEE} 802.11b for guaranteeing the real-time requirements}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {316--324}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.05.003}, doi = {10.1016/J.CSI.2006.05.003}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LeeHPLBL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LeeJLHHK07, author = {Jae{-}dong Lee and Jae{-}Il Jung and Jae{-}Ho Lee and Jong{-}Gyu Hwang and Jin{-}Ho Hwang and Sung Un Kim}, title = {Verification and conformance test generation of communication protocol for railway signaling systems}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {143--151}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.03.001}, doi = {10.1016/J.CSI.2006.03.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LeeJLHHK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LeeKL07, author = {Min{-}Hyung Lee and Yeon{-}Seok Kim and Kyong{-}Ho Lee}, title = {Logical structure analysis: From {HTML} to {XML}}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {109--124}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.02.001}, doi = {10.1016/J.CSI.2006.02.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LeeKL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LekkasS07, author = {Dimitrios Lekkas and Diomidis Spinellis}, title = {Implementing regular cash with blind fixed-value electronic coins}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {277--288}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.01.005}, doi = {10.1016/J.CSI.2006.01.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LekkasS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LiangHC07, author = {Wen{-}Yau Liang and Chun{-}Che Huang and Horng{-}Fu Chuang}, title = {The design with object (DwO) approach to Web services composition}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {54--68}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2005.11.001}, doi = {10.1016/J.CSI.2005.11.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LiangHC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LiuSKS07, author = {Jingwei Liu and Rong Sun and Weidong Kou and Xi Sun}, title = {The security analyses of RosettaNet in Grid}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {224--228}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.03.009}, doi = {10.1016/J.CSI.2006.03.009}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LiuSKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LohningF07, author = {Michael L{\"{o}}hning and Gerhard P. Fettweis}, title = {The effects of aperture jitter and clock jitter in wideband ADCs}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {11--18}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2005.12.005}, doi = {10.1016/J.CSI.2005.12.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LohningF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LouTL07, author = {Der{-}Chyuan Lou and Hao{-}Kuan Tso and Jiang{-}Lung Liu}, title = {A copyright protection scheme for digital images using visual cryptography technique}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {125--131}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.02.003}, doi = {10.1016/J.CSI.2006.02.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LouTL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LuC07, author = {Rongxing Lu and Zhenfu Cao}, title = {Erratum to "Non-interactive deniable authentication protocol based on factoring"[Computer Standards {\&} Interfaces 27 {(2005)} 401-405]}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {275}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.01.001}, doi = {10.1016/J.CSI.2006.01.001}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LuC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LuCWS07, author = {Rongxing Lu and Zhenfu Cao and Licheng Wang and Congkai Sun}, title = {A secure anonymous routing protocol with authenticated key exchange for ad hoc networks}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {521--527}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.007}, doi = {10.1016/J.CSI.2006.11.007}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LuCWS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LuCZ07, author = {Rongxing Lu and Zhenfu Cao and Haojin Zhu}, title = {An enhanced authenticated key agreement protocol for wireless mobile communication}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {6}, pages = {647--652}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2007.04.002}, doi = {10.1016/J.CSI.2007.04.002}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LuCZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LuLC07, author = {Wei Lu and Hongtao Lu and Fu{-}Lai Chung}, title = {Novel robust image watermarking using difference correlation detector}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {132--137}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.02.002}, doi = {10.1016/J.CSI.2006.02.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LuLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/MelladoFP07, author = {Daniel Mellado and Eduardo Fern{\'{a}}ndez{-}Medina and Mario Piattini}, title = {A common criteria based security requirements engineering process for the development of secure information systems}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {244--253}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.04.002}, doi = {10.1016/J.CSI.2006.04.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/MelladoFP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/NaumenkoW07, author = {Andrey Naumenko and Alain Wegmann}, title = {Formalization of the {RM-ODP} foundations based on the Triune Continuum Paradigm}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {39--53}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2005.10.001}, doi = {10.1016/J.CSI.2005.10.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/NaumenkoW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/PatelK07, author = {Ahmed Patel and Muhammad J. Khan}, title = {Evaluation of service management algorithms in a distributed web search system}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {152--160}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.03.002}, doi = {10.1016/J.CSI.2006.03.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/PatelK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/PetriR07, author = {Dario Petri and Sergio Rapuano}, title = {Introduction to special issue on {ADC} modelling and testing}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {3--4}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2005.12.001}, doi = {10.1016/J.CSI.2005.12.001}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/PetriR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Phan07, author = {Raphael C.{-}W. Phan}, title = {Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {4}, pages = {444--448}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.08.001}, doi = {10.1016/J.CSI.2006.08.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Phan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Phan07a, author = {Raphael C.{-}W. Phan}, title = {Reducing the exhaustive key search of the Data Encryption Standard {(DES)}}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {528--530}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.010}, doi = {10.1016/J.CSI.2006.11.010}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Phan07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/QadahT07, author = {Ghassan Z. Qadah and Rani Taha}, title = {Electronic voting systems: Requirements, design, and implementation}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {376--386}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.06.001}, doi = {10.1016/J.CSI.2006.06.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/QadahT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/RayZ07, author = {Indrajit Ray and Junxing Zhang}, title = {Towards a new standard for allowing concurrency and ensuring consistency in revision control systems}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {355--364}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.05.008}, doi = {10.1016/J.CSI.2006.05.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/RayZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Rodriguez-HenriquezAG07, author = {Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Daniel Ortiz Arroyo and Claudia Garc{\'{\i}}a{-}Zamora}, title = {Yet another improvement over the Mu-Varadharajan e-voting protocol}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {4}, pages = {471--480}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.003}, doi = {10.1016/J.CSI.2006.11.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Rodriguez-HenriquezAG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/RomeroVD07, author = {Jos{\'{e}} Ra{\'{u}}l Romero and Antonio Vallecillo and Francisco Dur{\'{a}}n}, title = {Writing and executing {ODP} computational viewpoint specifications using Maude}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {4}, pages = {481--498}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.004}, doi = {10.1016/J.CSI.2006.11.004}, timestamp = {Mon, 28 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/RomeroVD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Shim07, author = {Kyung{-}Ah Shim}, title = {Vulnerabilities of generalized {MQV} key agreement protocol without using one-way hash functions}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {4}, pages = {467--470}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.002}, doi = {10.1016/J.CSI.2006.11.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Shim07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Shim07a, author = {Kyung{-}Ah Shim}, title = {Potential weaknesses of AuthA password-authenticated key agreement protocols}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {580--583}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2007.01.002}, doi = {10.1016/J.CSI.2007.01.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/Shim07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/SilvestreS07, author = {Javier Silvestre{-}Blanes and V{\'{\i}}ctor{-}M. Sempere{-}Pay{\'{a}}}, title = {An architecture for flexible scheduling in Profibus networks}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {546--560}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.006}, doi = {10.1016/J.CSI.2006.11.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/SilvestreS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/SongYR07, author = {Eunjee Song and Shuxin Yin and Indrakshi Ray}, title = {Using {UML} to model relational database operations}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {343--354}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.05.006}, doi = {10.1016/J.CSI.2006.05.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/SongYR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/SungCS07, author = {Ahyoung Sung and Byoungju Choi and Seokkyoo Shin}, title = {An interface test model for hardware-dependent software and embedded {OS} {API} of the embedded system}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {4}, pages = {430--443}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.07.002}, doi = {10.1016/J.CSI.2006.07.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/SungCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/SwallowsYT07, author = {Dustin Swallows and David C. Yen and J. Michael Tarn}, title = {{XML} and {WML} integration: An analysis and strategies for implementation to meet mobile commerce challenges}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {97--108}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.01.003}, doi = {10.1016/J.CSI.2006.01.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/SwallowsYT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Tung07, author = {Cheng{-}Huang Tung}, title = {Key reduction of a Chinese phonetic input method by minimizing message ambiguity}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {571--579}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2007.01.001}, doi = {10.1016/J.CSI.2007.01.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Tung07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/VlaovicVBK07, author = {Bostjan Vlaovic and Aleksander Vreze and Zmago Brezocnik and Tatjana Kapus}, title = {Automated generation of Promela model from {SDL} specification}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {4}, pages = {449--461}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.10.001}, doi = {10.1016/J.CSI.2006.10.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/VlaovicVBK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/VlastosP07, author = {Emmanouil Vlastos and Ahmed Patel}, title = {An open source forensic tool to visualize digital evidence}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {6}, pages = {614--625}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2007.03.003}, doi = {10.1016/J.CSI.2007.03.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/VlastosP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Wang07, author = {Shiuh{-}Jeng Wang}, title = {Measures of retaining digital evidence to prosecute computer-based cyber-crimes}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {216--223}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.03.008}, doi = {10.1016/J.CSI.2006.03.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Wang07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/WangC07, author = {Ming{-}Shi Wang and Wei{-}Che Chen}, title = {A majority-voting based watermarking scheme for color image tamper detection and recovery}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {561--570}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.009}, doi = {10.1016/J.CSI.2006.11.009}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/WangC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/WangK07, author = {Shiuh{-}Jeng Wang and Da{-}Yu Kao}, title = {Internet forensics on the basis of evidence gathering with Peep attacks}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {4}, pages = {423--429}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.06.005}, doi = {10.1016/J.CSI.2006.06.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/WangK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/WangZZK07, author = {Xiaomin Wang and Wenfang Zhang and Jiashu Zhang and Muhammad Khurram Khan}, title = {Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {507--512}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.005}, doi = {10.1016/J.CSI.2006.11.005}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/WangZZK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Wei-lan07, author = {Wang Wei{-}lan}, title = {Intelligent input software of Tibetan}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {4}, pages = {462--466}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.11.001}, doi = {10.1016/J.CSI.2006.11.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Wei-lan07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/Willard07, author = {Brian Willard}, title = {{UML} for systems engineering}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {69--81}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2005.12.006}, doi = {10.1016/J.CSI.2005.12.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/Willard07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/YanWCL07, author = {Kuo{-}Qin Yan and Shu{-}Chin Wang and Chiu{-}Ping Chang and J. S. Lin}, title = {A hybrid load balancing policy underlying grid computing environment}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {2}, pages = {161--173}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.03.003}, doi = {10.1016/J.CSI.2006.03.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/YanWCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/YangH07, author = {Heng{-}Li Yang and Hsi{-}Chuan Ho}, title = {Emergent standard of knowledge management: Hybrid peer-to-peer knowledge management}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {4}, pages = {413--422}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.06.003}, doi = {10.1016/J.CSI.2006.06.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/YangH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ZhangLZWM07, author = {Yuting Zhang and Jianxin Liao and Xiaomin Zhu and Wei Wu and Jun Ma}, title = {Inter-working between {SIMPLE} and {IMPS}}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {5}, pages = {584--600}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2007.01.003}, doi = {10.1016/J.CSI.2007.01.003}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ZhangLZWM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ZhangR07, author = {Junxing Zhang and Indrajit Ray}, title = {Towards secure multi-sited transactional revision control systems}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {3}, pages = {365--375}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.05.007}, doi = {10.1016/J.CSI.2006.05.007}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ZhangR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/ZhaoZZ07, author = {Jian{-}jie Zhao and Jianzhong Zhang and Rong Zhao}, title = {A practical verifiable multi-secret sharing scheme}, journal = {Comput. Stand. Interfaces}, volume = {29}, number = {1}, pages = {138--141}, year = {2007}, url = {https://doi.org/10.1016/j.csi.2006.02.004}, doi = {10.1016/J.CSI.2006.02.004}, timestamp = {Sat, 02 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/ZhaoZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.