Volume 26, Number 1, January 2004
Volume 26, Number 2, March 2004
: Is the "Far-East" setting the standards for e- and m-commerce?
: Remote table-based log-in authentication upon geometric triangle.
: On the effects of the acyclic traffic on Profibus DP networks.
: PC-based automation systems: an example of application for the real-time control of blowing machines.
Volume 26, Number 3, May 2004
: Security of Chien et al.'s remote user authentication scheme using smart cards.
: Nonuniform memory reference of multistage interconnection networks.
Volume 26, Number 4, August 2004
: Quality of service in mobile networks and biometrics for face verification.
: On the security of an efficient two-pass key agreement protocol.
Volume 26, Number 5, September 2004
, Shyan-Ming Yuan
: Designing an XML-based context-aware transformation framework for mobile execution environments using CC/PP and XSLT.
Hassan A. Artail
: A client-based customization framework for web applications using JNLP.
: Efficient deniable authentication protocol based on generalized ElGamal signature scheme.
: Direct construction of a secret in generalized group-oriented cryptography.
, Chien-Lung Hsu
: Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers.
: Modeling the effect of hot spot contention on crossbar multiprocessors.
Volume 26, Number 6, October 2004
: Towards trust management standardization.
: A generalization of the E-LOTOS renaming operator: a convenience for specification of new forms of process composition.