Volume 27, Number 1, November 2004
: A distributed queue approach to resource locations in broadband distributed computing environments.
: A specifiable verifier group-oriented threshold signature scheme based on the elliptic curve cryptosystem.
: Improvement of threshold proxy signature scheme.
: Improvement of digital signature with message recovery and its variants based on elliptic curve discrete logarithm problem.
, S. Ahmed
: Implementation of cache coherence protocol for COMA multiprocessor systems based on the scalable coherent interface.
Volume 27, Number 2, January 2005
: Protection for software in measuring instruments.
, H. Joseph Wen
: Extension of Multiprotocol Label Switching for long-range dependent traffic: QoS routing and performance in IP networks.
Volume 27, Number 3, March 2005
Volume 27, Number 4, April 2005
Donna M. Evans
, David C. Yen
: Private key infrastructure: balancing computer transmission privacy with changing technology and security demands.
Volume 27, Number 5, June 2005
: Formal methods, techniques and tools for secure and reliable applications.
: A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols.
Volume 27, Number 6, June 2005
F. J. Jiménez
, J. De Frutos
: Virtual instrument for measurement, processing data, and visualization of vibration patterns of piezoelectric devices.