default search action
Computer Standards & Interfaces, Volume 29
Volume 29, Number 1, January 2007
- Dario Petri, Sergio Rapuano:
Introduction to special issue on ADC modelling and testing. 3-4 - Filippo Attivissimo, Nicola Giaquinto, Mario Savino:
Worst-case uncertainty measurement in ADC-based instruments. 5-10 - Michael Löhning, Gerhard P. Fettweis:
The effects of aperture jitter and clock jitter in wideband ADCs. 11-18 - Bertan Bakkaloglu, Sayfe Kiaei, Bikram Chaudhuri:
Delta-sigma (DeltaSigma) frequency synthesizers for wireless applications. 19-30 - Jean-Marie Janik, Vincent Fresnaud:
A spectral approach to estimate the INL of A/D converter. 31-37 - Andrey Naumenko, Alain Wegmann:
Formalization of the RM-ODP foundations based on the Triune Continuum Paradigm. 39-53 - Wen-Yau Liang, Chun-Che Huang, Horng-Fu Chuang:
The design with object (DwO) approach to Web services composition. 54-68 - Brian Willard:
UML for systems engineering. 69-81 - Muhammad Khurram Khan, Jiashu Zhang:
Improving the security of 'a flexible biometrics remote user authentication scheme'. 82-85 - Douglas Harris, Latifur Khan, Raymond Paul, Bhavani Thuraisingham:
Standards for secure data sharing across organizations. 86-96 - Dustin Swallows, David C. Yen, J. Michael Tarn:
XML and WML integration: An analysis and strategies for implementation to meet mobile commerce challenges. 97-108 - Min-Hyung Lee, Yeon-Seok Kim, Kyong-Ho Lee:
Logical structure analysis: From HTML to XML. 109-124 - Der-Chyuan Lou, Hao-Kuan Tso, Jiang-Lung Liu:
A copyright protection scheme for digital images using visual cryptography technique. 125-131 - Wei Lu, Hongtao Lu, Fu-Lai Chung:
Novel robust image watermarking using difference correlation detector. 132-137 - Jian-jie Zhao, Jianzhong Zhang, Rong Zhao:
A practical verifiable multi-secret sharing scheme. 138-141
Volume 29, Number 2, February 2007
- Jae-dong Lee, Jae-Il Jung, Jae-Ho Lee, Jong-Gyu Hwang, Jin-Ho Hwang, Sung Un Kim:
Verification and conformance test generation of communication protocol for railway signaling systems. 143-151 - Ahmed Patel, Muhammad J. Khan:
Evaluation of service management algorithms in a distributed web search system. 152-160 - Kuo-Qin Yan, Shu-Chin Wang, Chiu-Ping Chang, J. S. Lin:
A hybrid load balancing policy underlying grid computing environment. 161-173 - Kui Fu Chen:
On the condition of four-parameter sine wave fitting. 174-183 - Kui Fu Chen, Yi-Ming Xue:
Improving four-parameter sine wave fitting by normalization. 184-190 - Xiaoming Hu, Shangteng Huang:
A novel proxy key generation protocol and its application. 191-195 - Latifur Khan:
Standards for image annotation using Semantic Web. 196-204 - Monika Kapus-Kolar:
Enhanced event structures: Towards a true concurrency semantics for E-LOTOS. 205-215 - Shiuh-Jeng Wang:
Measures of retaining digital evidence to prosecute computer-based cyber-crimes. 216-223 - Jingwei Liu, Rong Sun, Weidong Kou, Xi Sun:
The security analyses of RosettaNet in Grid. 224-228 - Tzungher Chen, Gwoboa Horng:
A lightweight and anonymous copyright-protection protocol. 229-237 - Albert H. Huang, Shin-Yuan Hung, David C. Yen:
An exploratory investigation of two internet-based communication modes. 238-243 - Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
A common criteria based security requirements engineering process for the development of secure information systems. 244-253 - Hung-Yu Chien, Che-Hao Chen:
Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. 254-259 - Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena:
Threshold key issuing in identity-based cryptosystems. 260-264 - Gülfem Isiklar, Gülçin Büyüközkan:
Using a multi-criteria decision making approach to evaluate mobile phone alternatives. 265-274 - Rongxing Lu, Zhenfu Cao:
Erratum to "Non-interactive deniable authentication protocol based on factoring"[Computer Standards & Interfaces 27 (2005) 401-405]. 275
Volume 29, Number 3, March 2007
- Dimitrios Lekkas, Diomidis Spinellis:
Implementing regular cash with blind fixed-value electronic coins. 277-288 - Ram Dantu, Gabriel Clothier, Anuj Atri:
EAP methods for wireless networks. 289-301 - Jung-Min Kim, Byoung-Il Choi, Hyo-Phil Shin, Hyoung-Joo Kim:
A methodology for constructing of philosophy ontology based on philosophical texts. 302-315 - Suk Lee, Kyoung Nam Ha, Ji Hoon Park, Kyung Chang Lee, Gi Sig Byun, Hyung Ki Lee:
NDIS-based virtual polling algorithm for IEEE 802.11b for guaranteeing the real-time requirements. 316-324 - Sinuhé Arroyo, Alistair Duke, José Manuel López Cobo, Miguel-Ángel Sicilia:
A model-driven choreography conceptual framework. 325-334 - Lotfi Boussaid, Abdellatif Mtibaa, Mohamed Abid, Michel Paindavoine:
A real-time shot cut detector: Hardware implementation. 335-342 - Eunjee Song, Shuxin Yin, Indrakshi Ray:
Using UML to model relational database operations. 343-354 - Indrajit Ray, Junxing Zhang:
Towards a new standard for allowing concurrency and ensuring consistency in revision control systems. 355-364 - Junxing Zhang, Indrajit Ray:
Towards secure multi-sited transactional revision control systems. 365-375 - Ghassan Z. Qadah, Rani Taha:
Electronic voting systems: Requirements, design, and implementation. 376-386 - Ivan Cibrario Bertolotti, Luca Durante, Paolo Maggi, Riccardo Sisto, Adriano Valenzano:
Improving the security of industrial networks by means of formal verification. 387-397 - Aleksej Jerman Blazic, Tomaz Klobucar, Borka Dzonova-Jerman-Blazic:
Long-term trusted preservation service using service interaction protocol and evidence records. 398-412
Volume 29, Number 4, May 2007
- Heng-Li Yang, Hsi-Chuan Ho:
Emergent standard of knowledge management: Hybrid peer-to-peer knowledge management. 413-422 - Shiuh-Jeng Wang, Da-Yu Kao:
Internet forensics on the basis of evidence gathering with Peep attacks. 423-429 - Ahyoung Sung, Byoungju Choi, Seokkyoo Shin:
An interface test model for hardware-dependent software and embedded OS API of the embedded system. 430-443 - Raphael C.-W. Phan:
Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks. 444-448 - Bostjan Vlaovic, Aleksander Vreze, Zmago Brezocnik, Tatjana Kapus:
Automated generation of Promela model from SDL specification. 449-461 - Wang Wei-lan:
Intelligent input software of Tibetan. 462-466 - Kyung-Ah Shim:
Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions. 467-470 - Francisco Rodríguez-Henríquez, Daniel Ortiz Arroyo, Claudia García-Zamora:
Yet another improvement over the Mu-Varadharajan e-voting protocol. 471-480 - José Raúl Romero, Antonio Vallecillo, Francisco Durán:
Writing and executing ODP computational viewpoint specifications using Maude. 481-498 - Kemal Bicakci:
One-time proxy signatures revisited. 499-505
Volume 29, Number 5, July 2007
- Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhammad Khurram Khan:
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. 507-512 - Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee:
Efficient verifier-based password-authenticated key exchange in the three-party setting. 513-520 - Rongxing Lu, Zhenfu Cao, Licheng Wang, Congkai Sun:
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks. 521-527 - Raphael C.-W. Phan:
Reducing the exhaustive key search of the Data Encryption Standard (DES). 528-530 - Min-Xiou Chen, Chen-Jui Peng, Ren-Hung Hwang:
SSIP: Split a SIP session over multiple devices. 531-545 - Javier Silvestre-Blanes, Víctor-M. Sempere-Payá:
An architecture for flexible scheduling in Profibus networks. 546-560 - Ming-Shi Wang, Wei-Che Chen:
A majority-voting based watermarking scheme for color image tamper detection and recovery. 561-570 - Cheng-Huang Tung:
Key reduction of a Chinese phonetic input method by minimizing message ambiguity. 571-579 - Kyung-Ah Shim:
Potential weaknesses of AuthA password-authenticated key agreement protocols. 580-583 - Yuting Zhang, Jianxin Liao, Xiaomin Zhu, Wei Wu, Jun Ma:
Inter-working between SIMPLE and IMPS. 584-600
Volume 29, Number 6, September 2007
- Yu-Fang Chung, Kuo-Hsuan Huang, Feipei Lai, Tzer-Shyong Chen:
ID-based digital signature scheme on the elliptic curve cryptosystem. 601-604 - Tineke M. Egyedi:
Standard-compliant, but incompatible?! 605-613 - Emmanouil Vlastos, Ahmed Patel:
An open source forensic tool to visualize digital evidence. 614-625 - Shin-Yuan Hung, Albert H. Huang, David C. Yen, Chia-Ming Chang:
Comparing the task effectiveness of instant messaging and electronic mail for geographically dispersed teams in Taiwan. 626-634 - Angelo Furfaro, Libero Nigro:
Timed verification of hierarchical communicating real-time state machines. 635-646 - Rongxing Lu, Zhenfu Cao, Haojin Zhu:
An enhanced authenticated key agreement protocol for wireless mobile communication. 647-652 - Ho-Won Jung:
Validating the external quality subcharacteristics of software products according to ISO/IEC 9126. 653-661 - Gianluca Cena, Ivan Cibrario Bertolotti, Adriano Valenzano:
A socket interface for CAN devices. 662-673
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.