Content of Issue 5
DOI: 10.3217/jucs-015-05
|
Data Security and Privacy Protection in Pervasive Computing Environments |
B.-S. Koh, M. Denko, S. Gritzalis, C.-H. Hsu |
967 |
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents |
P. Najera, F. Moyano, J. Lopez |
970 |
Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols |
P. Pecho, F. Zboril Jr., M. Drahansky, P. Hanacek |
992 |
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments |
C. Lee, J. Kim, S. Hong, Y.-S. Lee |
1007 |
Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks |
S. Lian, Y. Zhang |
1023 |
Light-Weight Key Exchange with Different Passwords in the Standard Model |
J.O. Kwon, I.R. Jeong, D.H. Lee |
1042 |
USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework |
J.H. Park |
1065 |
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication |
D. Bhattacharyya, P. Das, T.-h. Kim, S.K. Bandyopadhyay |
1081 |
Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network |
Y.H. Ho, A.H. Ho, K.A. Hua, F. Xie |
1090 |
A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security |
N. Xiong, J. He, J.H. Park, D. Cooley, Y. Li |
1119 |