Volume 31, Number 1, January 2009
: An action refinement operator for E-LOTOS with true concurrency.
, Ira Sack
: Mechanisms for communication between business and IT experts.
, Layuan Li
: An efficient coordination scheme between layers of grid architecture.
: USIM-based EAP-TLS authentication protocol for wireless local area networks.
: Determining the mobile commerce user requirements using an analytic approach.
: Semantic interoperability in eGovernment initiatives.
, Chi-Lun Liu
: A new standard of on-line customer service process: Integrating language-action into blogs.
Volume 31, Number 2, February 2009
: A novel access control protocol for secure sensor networks.
, Qiaoyan Wen
: Efficient and provably-secure certificateless short signature scheme from bilinear pairings.
Volume 31, Number 3, March 2009
Volume 31, Number 4, June 2009 Review
, Daesung Kwon
: Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards.
: Price aggregation in an end-to-end QoS provisioning.
Sherman S. M. Chow
: Blind signature and ring signature schemes: Rehabilitation and attack.
, Ruan-Han Dai
: The implementation guidance for practicing network isolation by referring to ISO-17799 standard.
, Wei-Che Chen
: A hybrid DWT-SVD copyright protection scheme based on k-means clustering and visual cryptography.
: Protocol interoperability in mobile IP enabled mobile ad hoc networks.
Volume 31, Number 5, September 2009 Special Issue:
Specification, Standards and Information Management for Distributed Systems
: Reversible enhanced event structures: Towards reversible E-LOTOS.
, Dominique Dallet
: Choice of the acquisition parameters for frequency estimation of a sine wave by interpolated DFT method.
Volume 31, Number 6, November 2009 Review paper
, Wei-Kuan Shih
: Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment.
, Layuan Li
: Utility-based scheduling for grid computing under constraints of energy budget and deadline.