no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A hybrid approach for privacy-preserving RFID tags
|
Ryu, Eun-Kyung |
|
2009 |
31 |
4 |
p. 812-815 4 p. |
article |
2 |
A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography
|
Wang, Ming-Shi |
|
2009 |
31 |
4 |
p. 757-762 6 p. |
article |
3 |
A key management protocol with robust continuity for sensor networks
|
Wen, Mi |
|
2009 |
31 |
4 |
p. 642-647 6 p. |
article |
4 |
AlexVG: An OpenVG implementation with SVG-Tiny support
|
Lee, Hwanyong |
|
2009 |
31 |
4 |
p. 661-668 8 p. |
article |
5 |
An efficient proxy raffle protocol with anonymity-preserving
|
Chang, Chin-Chen |
|
2009 |
31 |
4 |
p. 772-778 7 p. |
article |
6 |
A new QoS-aware TDMA/FDD MAC protocol with multi-beam directional antennas
|
Atmaca, Sedat |
|
2009 |
31 |
4 |
p. 816-829 14 p. |
article |
7 |
An improved smart card based password authentication scheme with provable security
|
Xu, Jing |
|
2009 |
31 |
4 |
p. 723-728 6 p. |
article |
8 |
A PK-SIM card based end-to-end security framework for SMS
|
Rongyu, He |
|
2009 |
31 |
4 |
p. 629-641 13 p. |
article |
9 |
A root-based strategy for constructing a clustered MANET in all-IP networks
|
Li, Long-Sheng |
|
2009 |
31 |
4 |
p. 699-706 8 p. |
article |
10 |
Blind signature and ring signature schemes: Rehabilitation and attack
|
Chow, Sherman S.M. |
|
2009 |
31 |
4 |
p. 707-712 6 p. |
article |
11 |
Editorial Board
|
|
|
2009 |
31 |
4 |
p. iii- 1 p. |
article |
12 |
Efficient hardware architecture of 2D-scan-based wavelet watermarking for image and video
|
Karmani, Sourour |
|
2009 |
31 |
4 |
p. 801-811 11 p. |
article |
13 |
High-capacity reversible data hiding in binary images using pattern substitution
|
Ho, Yu-An |
|
2009 |
31 |
4 |
p. 787-794 8 p. |
article |
14 |
Improvised layout of keypad entry system for mobile phones
|
Mittal, Arpit |
|
2009 |
31 |
4 |
p. 693-698 6 p. |
article |
15 |
Model-driven eGovernment interoperability: A review of the state of the art
|
Peristeras, Vassilios |
|
2009 |
31 |
4 |
p. 613-628 16 p. |
article |
16 |
OWL-L: An OWL-based language for Web resources links
|
Hsu, I-Ching |
|
2009 |
31 |
4 |
p. 846-855 10 p. |
article |
17 |
Price aggregation in an end-to-end QoS provisioning
|
Turk, Tomaž |
|
2009 |
31 |
4 |
p. 685-692 8 p. |
article |
18 |
Procedure guidance for Internet forensics coping with copyright arguments of client-server-based P2P models
|
Wang, Shiuh-Jeng |
|
2009 |
31 |
4 |
p. 795-800 6 p. |
article |
19 |
Protocol interoperability in mobile IP enabled mobile ad hoc networks
|
Ding, Shuo |
|
2009 |
31 |
4 |
p. 830-845 16 p. |
article |
20 |
Ring signature scheme for ECC-based anonymous signcryption
|
Chung, Yu Fang |
|
2009 |
31 |
4 |
p. 669-674 6 p. |
article |
21 |
Sdl2pml — Tool for automated generation of Promela model from SDL specification
|
Vreže, Aleksander |
|
2009 |
31 |
4 |
p. 779-786 8 p. |
article |
22 |
Simplified software inspection process in compliance with international standards
|
Mishra, Deepti |
|
2009 |
31 |
4 |
p. 763-771 9 p. |
article |
23 |
Smart phone for mobile commerce
|
Chang, Yung Fu |
|
2009 |
31 |
4 |
p. 740-747 8 p. |
article |
24 |
Software describing attributes
|
Jereb, Borut |
|
2009 |
31 |
4 |
p. 653-660 8 p. |
article |
25 |
Strong unforgeability in group signature schemes
|
Park, Haeryong |
|
2009 |
31 |
4 |
p. 856-862 7 p. |
article |
26 |
The anatomy study of high performance task scheduling algorithm for Grid computing system
|
Tseng, L.Y. |
|
2009 |
31 |
4 |
p. 713-722 10 p. |
article |
27 |
The implementation guidance for practicing network isolation by referring to ISO-17799 standard
|
Lai, Yeu-Pong |
|
2009 |
31 |
4 |
p. 748-756 9 p. |
article |
28 |
The integration of home-automation and IPTV system and services
|
Umberger, Mark |
|
2009 |
31 |
4 |
p. 675-684 10 p. |
article |
29 |
Using empirical mode decomposition for iris recognition
|
Chang, Chien-Ping |
|
2009 |
31 |
4 |
p. 729-739 11 p. |
article |
30 |
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
|
Han, Daewan |
|
2009 |
31 |
4 |
p. 648-652 5 p. |
article |
31 |
Weaknesses and improvement of Wang et al.'s remote user password authentication scheme for resource-limited environments
|
Chung, Hao-Rung |
|
2009 |
31 |
4 |
p. 863-868 6 p. |
article |