no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A fingerprint-based user authentication protocol considering both the mobility and security in the telematics environment
|
Kim, Hakjae |
|
2009 |
31 |
6 |
p. 1098-1107 10 p. |
article |
2 |
An efficient and provable secure identity-based ring signcryption scheme
|
Zhu, ZhenChao |
|
2009 |
31 |
6 |
p. 1092-1097 6 p. |
article |
3 |
An efficient implementation algorithm for generating de Bruijn sequences
|
Zhang, Weiguo |
|
2009 |
31 |
6 |
p. 1190-1191 2 p. |
article |
4 |
A new algorithm for encryption/decryption for field applications
|
Ramasamy, Rajaram |
|
2009 |
31 |
6 |
p. 1069-1072 4 p. |
article |
5 |
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
|
Choi, Eun Young |
|
2009 |
31 |
6 |
p. 1124-1130 7 p. |
article |
6 |
Architectural impact of the SVG-based graphical components in web applications
|
Moreno, Edward David |
|
2009 |
31 |
6 |
p. 1150-1157 8 p. |
article |
7 |
Business to business interoperability: A current review of XML data integration standards
|
Lampathaki, Fenareti |
|
2009 |
31 |
6 |
p. 1045-1055 11 p. |
article |
8 |
Cryptanalysis of two three-party encrypted key exchange protocols
|
Lo, N.W. |
|
2009 |
31 |
6 |
p. 1167-1174 8 p. |
article |
9 |
Data hiding based on compressed VQ indices of images
|
Shie, Shih-Chieh |
|
2009 |
31 |
6 |
p. 1143-1149 7 p. |
article |
10 |
Designing distributed software with RT-CORBA and SDL
|
Díaz, Manuel |
|
2009 |
31 |
6 |
p. 1073-1091 19 p. |
article |
11 |
Editorial Board
|
|
|
2009 |
31 |
6 |
p. iii- 1 p. |
article |
12 |
Efficient migration access control for mobile agents
|
Chung, Yu-Fang |
|
2009 |
31 |
6 |
p. 1061-1068 8 p. |
article |
13 |
Exploiting an antivirus interface
|
Hamlen, Kevin W. |
|
2009 |
31 |
6 |
p. 1182-1189 8 p. |
article |
14 |
Global Interoperability Using Semantics, Standards, Science and Technology (GIS3T)
|
Waters, Jeff |
|
2009 |
31 |
6 |
p. 1158-1166 9 p. |
article |
15 |
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
|
Hsiang, Han-Cheng |
|
2009 |
31 |
6 |
p. 1118-1123 6 p. |
article |
16 |
Mapping standards for home networking
|
van de Kaa, Geerten |
|
2009 |
31 |
6 |
p. 1175-1181 7 p. |
article |
17 |
Semantic annotations for web services discovery and composition
|
Talantikite, Hassina Nacer |
|
2009 |
31 |
6 |
p. 1108-1117 10 p. |
article |
18 |
Two improved two-party identity-based authenticated key agreement protocols
|
Hölbl, Marko |
|
2009 |
31 |
6 |
p. 1056-1060 5 p. |
article |
19 |
Utility-based scheduling for grid computing under constraints of energy budget and deadline
|
Li, Chunlin |
|
2009 |
31 |
6 |
p. 1131-1142 12 p. |
article |