default search action
Computer Standards & Interfaces, Volume 30
Volume 30, Numbers 1-2, January 2008
- Kwo-Jean Farn, Shu-Kuo Lin, Chi-Chun Lo:
A study on e-Taiwan information system security classification and implementation. 1-7 - Emmanouil Vlastos, Ahmed Patel:
An open source forensic tool to visualize digital evidence. 8-19 - Celal Ceken:
An energy efficient and delay sensitive centralized MAC protocol for wireless sensor networks. 20-31 - Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng:
Attacks on a robust watermarking scheme based on self-reference image. 32-35 - Seungjun Kim, Nitaigour-Premchand Mahalik, Anind K. Dey, Jeha Ryu, Byung-Ha Ahn:
Feasibility and infrastructural study of AR interfacing and intuitive simulation on 3D nonlinear systems. 36-51 - Yi-Hung Huang, Kuan-Cheng Lin, Chao-Yu Kuo, Chin-Hsing Chen, Yen-Ping Chu:
Enhancement of fairness in a DiffServ network using a novel queuing algorithm. 52-61 - María del Puerto Paule Ruíz, M. Jesús Fernández Díaz, Francisco Ortín Soler, Juan Ramón Pérez-Pérez:
Adaptation in current e-learning systems. 62-70 - Tian-Fu Lee, Mei-Jiun Sung:
Communication-efficient AUTHMAC_DH protocols. 71-77 - Shao-Shin Hung, Damon Shing-Min Liu:
A user-oriented ontology-based approach for network intrusion detection. 78-88 - Fagen Li, Xiangjun Xin, Yupu Hu:
Indentity-based broadcast signcryption. 89-94 - Hsing-Bai Chen, Tzungher Chen, Wei-Bin Lee, Chin-Chen Chang:
Security enhancement for a three-party encrypted key exchange protocol against undetectable on-line password guessing attacks. 95-99
Volume 30, Number 3, March 2008
- Raphael Chung-Wei Phan:
Cryptanalysis of e-mail protocols providing perfect forward secrecy. 101-105 - Tzu-Chao Lin:
Progressive decision-based mean type filter for image noise suppression. 106-114 - Yong-Gang Fu, Ruimin Shen:
Color image watermarking scheme based on linear discriminant analysis. 115-120 - Kyung-Ah Shim:
Forgery attacks on the ID-based multisignature scheme without reblocking and predetermined signing order. 121-123 - José Luis Salazar, Joan Josep Piles, José Ruíz-Mas, José María Moreno-Jiménez:
E-cognocracy and its voting process. 124-131 - Wei Lu, Fu-Lai Chung, Hongtao Lu, Kup-Sze Choi:
Detecting fake images using watermarks and support vector machines. 132-136 - Salvador Bueno, Jose L. Salmeron:
Fuzzy modeling Enterprise Resource Planning tool selection. 137-147 - Pui-Lai To, Chechen Liao, Jerry C. Chiang, Meng-Lin Shih, Chun-Yuan Chang:
An empirical investigation of the factors affecting the adoption of Instant Messaging in organizations. 148-156 - S. Da'na, Assim Sagahyroon, A. Elrayes, Abdul-Rahman Al-Ali, R. Al-Aydi:
Development of a monitoring and control platform for PLC-based applications. 157-166 - Xiaohui Liang, Zhenfu Cao, Rongxing Lu, Liuquan Qin:
Efficient and secure protocol in fair document exchange. 167-176 - Ibrahim Özçelik, Hüseyin Ekiz:
Design, implementation and performance analysis of the CAN/ATM local bridge. 177-186 - Massoud Hadian Dehkordi, Samaneh Mashhadi:
An efficient threshold verifiable multi-secret sharing. 187-190 - Hui-Chieh Lu, Yen-Ping Chu, Ruey-Kai Sheu, Win-Tsung Lo:
A generic application sharing architecture based on message-oriented middleware platform. 191-199 - Cüneyt Bayilmis, Ismail Erturk, Celal Ceken, Ibrahim Özçelik:
A CAN/IEEE 802.11b wireless Lan local bridge design. 200-212
Volume 30, Number 4, May 2008
- Ahmed Patel:
Frameworks for secure, forensically safe and auditable applications. 213-215 - Rok Bojanc, Borka Jerman-Blazic:
Towards a standard approach for quantifying an ICT security investment. 216-222 - Vasilios Katos, Peter M. Bednar:
A cyber-crime investigation framework. 223-228 - Giannakis Antoniou, Leon Sterling, Stefanos Gritzalis, Parampalli Udaya:
Privacy and forensics investigation process: The ERPINA protocol. 229-236 - Norleyza Jailani, Noor Faezah Mohd Yatim, Yazrina Yahya, Ahmed Patel, Mazliza Othman:
Secure and auditable agent-based e-marketplace framework for mobile users. 237-252 - Vicente Benjumea, Javier López, José M. Troya:
Anonymity analysis in credentials-based systems: A formal framework. 253-261 - Theodore Tryfonas, Bob Kearney:
Standardising business application security assessments with pattern-driven audit automations. 262-270
Volume 30, Number 5, July 2008
- Yu-Tzu Lin, Ja-Ling Wu:
Content adaptive watermarking for multimedia fingerprinting. 271-287 - Seung-Hyun Seo, Jung Yeon Hwang, Kyu Young Choi, Dong Hoon Lee:
Identity-based universal designated multi-verifiers signature schemes. 288-295 - Yeon-Seok Kim, Kyong-Ho Lee:
Extracting logical structures from HTML tables. 296-308 - Eun-Jun Yoon, Kee-Young Yoo:
Improving the novel three-party encrypted key exchange protocol. 309-314 - Anna Medve:
Advanced steps with standardized languages in the re-engineering process. 315-322 - Pedro M. Ramos, A. Cruz Serra:
Impedance measurement using multiharmonic least-squares waveform fitting algorithm. 323-328 - Shu-Ching Wang, Hsin-Hung Pan, Kuo-Qin Yan, Yu-lung Lo:
A unified framework for cluster manager election and clustering mechanism in mobile ad hoc networks. 329-338
Volume 30, Number 6, August 2008
- Eduardo Fernández-Medina, Mariemma Inmaculada Yagüe del Valle:
State of standards in the information systems security area. 339-340 - Emilio Soler, Juan Trujillo, Eduardo Fernández-Medina, Mario Piattini:
Building a secure star schema in data warehouses by an extension of the relational package from CWM. 341-350 - Omid Tafreschi, Dominique Mähler, Janina Fengel, Michael Rebstock, Claudia Eckert:
A reputation system for electronic negotiations. 351-360 - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Towards security requirements management for software product lines: A security domain requirements engineering process. 361-371 - Berthold Agreiter, Michael Hafner, Ruth Breu:
A fair Non-repudiation service in a web services peer-to-peer environment. 372-378 - Ernesto Damiani, Majirus Fansi, Alban Gabillon, Stefania Marrara:
A general approach to securely querying XML. 379-389 - Klaus Plößl, Hannes Federrath:
A privacy aware and efficient security infrastructure for vehicular ad hoc networks. 390-397 - Gerardo Canfora, Elisa Costante, Igino Pennino, Corrado Aaron Visaggio:
A three-layered model to implement data privacy policies. 398-409 - Anna Zych, Milan Petkovic, Willem Jonker:
Efficient key management for cryptographically enforced access control. 410-417 - Gabriel López, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Manuel Sánchez:
A proposal for extending the eduroam infrastructure with authorization mechanisms. 418-423 - Marco Prandini, Marco Ramilli:
Redesigning remote system administration paradigms for enhanced security and flexibility. 424-432
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.