


default search action
Computer Standards & Interfaces, Volume 29
Volume 29, Number 1, January 2007
- Dario Petri

, Sergio Rapuano
:
Introduction to special issue on ADC modelling and testing. 3-4 - Filippo Attivissimo

, Nicola Giaquinto
, Mario Savino:
Worst-case uncertainty measurement in ADC-based instruments. 5-10 - Michael Löhning, Gerhard P. Fettweis:

The effects of aperture jitter and clock jitter in wideband ADCs. 11-18 - Bertan Bakkaloglu

, Sayfe Kiaei, Bikram Chaudhuri:
Delta-sigma (DeltaSigma) frequency synthesizers for wireless applications. 19-30 - Jean-Marie Janik, Vincent Fresnaud:

A spectral approach to estimate the INL of A/D converter. 31-37 - Andrey Naumenko

, Alain Wegmann:
Formalization of the RM-ODP foundations based on the Triune Continuum Paradigm. 39-53 - Wen-Yau Liang, Chun-Che Huang, Horng-Fu Chuang:

The design with object (DwO) approach to Web services composition. 54-68 - Brian Willard:

UML for systems engineering. 69-81 - Muhammad Khurram Khan

, Jiashu Zhang:
Improving the security of 'a flexible biometrics remote user authentication scheme'. 82-85 - Douglas Harris, Latifur Khan

, Raymond Paul, Bhavani Thuraisingham:
Standards for secure data sharing across organizations. 86-96 - Dustin Swallows, David C. Yen

, J. Michael Tarn:
XML and WML integration: An analysis and strategies for implementation to meet mobile commerce challenges. 97-108 - Min-Hyung Lee, Yeon-Seok Kim, Kyong-Ho Lee

:
Logical structure analysis: From HTML to XML. 109-124 - Der-Chyuan Lou

, Hao-Kuan Tso, Jiang-Lung Liu:
A copyright protection scheme for digital images using visual cryptography technique. 125-131 - Wei Lu, Hongtao Lu, Fu-Lai Chung

:
Novel robust image watermarking using difference correlation detector. 132-137 - Jian-jie Zhao, Jianzhong Zhang, Rong Zhao:

A practical verifiable multi-secret sharing scheme. 138-141
Volume 29, Number 2, February 2007
- Jae-dong Lee, Jae-Il Jung, Jae-Ho Lee, Jong-Gyu Hwang, Jin-Ho Hwang, Sung Un Kim:

Verification and conformance test generation of communication protocol for railway signaling systems. 143-151 - Ahmed Patel, Muhammad J. Khan:

Evaluation of service management algorithms in a distributed web search system. 152-160 - Kuo-Qin Yan, Shu-Chin Wang, Chiu-Ping Chang, J. S. Lin:

A hybrid load balancing policy underlying grid computing environment. 161-173 - Kui Fu Chen:

On the condition of four-parameter sine wave fitting. 174-183 - Kui Fu Chen, Yi-Ming Xue:

Improving four-parameter sine wave fitting by normalization. 184-190 - Xiaoming Hu, Shangteng Huang:

A novel proxy key generation protocol and its application. 191-195 - Latifur Khan

:
Standards for image annotation using Semantic Web. 196-204 - Monika Kapus-Kolar:

Enhanced event structures: Towards a true concurrency semantics for E-LOTOS. 205-215 - Shiuh-Jeng Wang:

Measures of retaining digital evidence to prosecute computer-based cyber-crimes. 216-223 - Jingwei Liu

, Rong Sun, Weidong Kou, Xi Sun:
The security analyses of RosettaNet in Grid. 224-228 - Tzungher Chen

, Gwoboa Horng
:
A lightweight and anonymous copyright-protection protocol. 229-237 - Albert H. Huang, Shin-Yuan Hung, David C. Yen

:
An exploratory investigation of two internet-based communication modes. 238-243 - Daniel Mellado, Eduardo Fernández-Medina

, Mario Piattini
:
A common criteria based security requirements engineering process for the development of secure information systems. 244-253 - Hung-Yu Chien, Che-Hao Chen:

Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards. 254-259 - Raju Gangishetti, M. Choudary Gorantla, Manik Lal Das, Ashutosh Saxena

:
Threshold key issuing in identity-based cryptosystems. 260-264 - Gülfem Isiklar

, Gülçin Büyüközkan
:
Using a multi-criteria decision making approach to evaluate mobile phone alternatives. 265-274 - Rongxing Lu, Zhenfu Cao

:
Erratum to "Non-interactive deniable authentication protocol based on factoring"[Computer Standards & Interfaces 27 (2005) 401-405]. 275
Volume 29, Number 3, March 2007
- Dimitrios Lekkas, Diomidis Spinellis

:
Implementing regular cash with blind fixed-value electronic coins. 277-288 - Ram Dantu, Gabriel Clothier, Anuj Atri:

EAP methods for wireless networks. 289-301 - Jung-Min Kim, Byoung-Il Choi, Hyo-Phil Shin, Hyoung-Joo Kim:

A methodology for constructing of philosophy ontology based on philosophical texts. 302-315 - Suk Lee, Kyoung Nam Ha, Ji Hoon Park, Kyung Chang Lee

, Gi Sig Byun, Hyung Ki Lee:
NDIS-based virtual polling algorithm for IEEE 802.11b for guaranteeing the real-time requirements. 316-324 - Sinuhé Arroyo, Alistair Duke, José Manuel López Cobo, Miguel-Ángel Sicilia

:
A model-driven choreography conceptual framework. 325-334 - Lotfi Boussaid, Abdellatif Mtibaa

, Mohamed Abid, Michel Paindavoine:
A real-time shot cut detector: Hardware implementation. 335-342 - Eunjee Song

, Shuxin Yin, Indrakshi Ray:
Using UML to model relational database operations. 343-354 - Indrajit Ray, Junxing Zhang:

Towards a new standard for allowing concurrency and ensuring consistency in revision control systems. 355-364 - Junxing Zhang, Indrajit Ray:

Towards secure multi-sited transactional revision control systems. 365-375 - Ghassan Z. Qadah, Rani Taha:

Electronic voting systems: Requirements, design, and implementation. 376-386 - Ivan Cibrario Bertolotti, Luca Durante

, Paolo Maggi, Riccardo Sisto
, Adriano Valenzano:
Improving the security of industrial networks by means of formal verification. 387-397 - Aleksej Jerman Blazic, Tomaz Klobucar

, Borka Dzonova-Jerman-Blazic:
Long-term trusted preservation service using service interaction protocol and evidence records. 398-412
Volume 29, Number 4, May 2007
- Heng-Li Yang, Hsi-Chuan Ho:

Emergent standard of knowledge management: Hybrid peer-to-peer knowledge management. 413-422 - Shiuh-Jeng Wang, Da-Yu Kao:

Internet forensics on the basis of evidence gathering with Peep attacks. 423-429 - Ahyoung Sung, Byoungju Choi, Seokkyoo Shin:

An interface test model for hardware-dependent software and embedded OS API of the embedded system. 430-443 - Raphael C.-W. Phan

:
Extending commutative diagram cryptanalysis to slide, boomerang, rectangle and square attacks. 444-448 - Bostjan Vlaovic

, Aleksander Vreze, Zmago Brezocnik, Tatjana Kapus:
Automated generation of Promela model from SDL specification. 449-461 - Wang Wei-lan:

Intelligent input software of Tibetan. 462-466 - Kyung-Ah Shim:

Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions. 467-470 - Francisco Rodríguez-Henríquez, Daniel Ortiz Arroyo, Claudia García-Zamora:

Yet another improvement over the Mu-Varadharajan e-voting protocol. 471-480 - José Raúl Romero

, Antonio Vallecillo
, Francisco Durán
:
Writing and executing ODP computational viewpoint specifications using Maude. 481-498 - Kemal Bicakci

:
One-time proxy signatures revisited. 499-505
Volume 29, Number 5, July 2007
- Xiaomin Wang, Wenfang Zhang, Jiashu Zhang, Muhammad Khurram Khan

:
Cryptanalysis and improvement on two efficient remote user authentication scheme using smart cards. 507-512 - Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee:

Efficient verifier-based password-authenticated key exchange in the three-party setting. 513-520 - Rongxing Lu, Zhenfu Cao

, Licheng Wang, Congkai Sun:
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks. 521-527 - Raphael C.-W. Phan

:
Reducing the exhaustive key search of the Data Encryption Standard (DES). 528-530 - Min-Xiou Chen, Chen-Jui Peng, Ren-Hung Hwang

:
SSIP: Split a SIP session over multiple devices. 531-545 - Javier Silvestre-Blanes

, Víctor-M. Sempere-Payá
:
An architecture for flexible scheduling in Profibus networks. 546-560 - Ming-Shi Wang, Wei-Che Chen:

A majority-voting based watermarking scheme for color image tamper detection and recovery. 561-570 - Cheng-Huang Tung:

Key reduction of a Chinese phonetic input method by minimizing message ambiguity. 571-579 - Kyung-Ah Shim:

Potential weaknesses of AuthA password-authenticated key agreement protocols. 580-583 - Yuting Zhang, Jianxin Liao, Xiaomin Zhu, Wei Wu, Jun Ma:

Inter-working between SIMPLE and IMPS. 584-600
Volume 29, Number 6, September 2007
- Yu-Fang Chung

, Kuo-Hsuan Huang, Feipei Lai, Tzer-Shyong Chen
:
ID-based digital signature scheme on the elliptic curve cryptosystem. 601-604 - Tineke M. Egyedi:

Standard-compliant, but incompatible?! 605-613 - Emmanouil Vlastos, Ahmed Patel:

An open source forensic tool to visualize digital evidence. 614-625 - Shin-Yuan Hung, Albert H. Huang, David C. Yen

, Chia-Ming Chang:
Comparing the task effectiveness of instant messaging and electronic mail for geographically dispersed teams in Taiwan. 626-634 - Angelo Furfaro

, Libero Nigro:
Timed verification of hierarchical communicating real-time state machines. 635-646 - Rongxing Lu, Zhenfu Cao

, Haojin Zhu
:
An enhanced authenticated key agreement protocol for wireless mobile communication. 647-652 - Ho-Won Jung:

Validating the external quality subcharacteristics of software products according to ISO/IEC 9126. 653-661 - Gianluca Cena

, Ivan Cibrario Bertolotti, Adriano Valenzano:
A socket interface for CAN devices. 662-673

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














