Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Volume 15

Content of Issue 5
DOI: 10.3217/jucs-015-05
Data Security and Privacy Protection in Pervasive Computing Environments B.-S. Koh, M. Denko, S. Gritzalis, C.-H. Hsu 967
Security Mechanisms and Access Control Infrastructure for e-Passports and General Purpose e-Documents P. Najera, F. Moyano, J. Lopez 970
Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols P. Pecho, F. Zboril Jr., M. Drahansky, P. Hanacek 992
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments C. Lee, J. Kim, S. Hong, Y.-S. Lee 1007
Protecting Mobile TV Multimedia Content in DVB/GPRS Heterogeneous Wireless Networks S. Lian, Y. Zhang 1023
Light-Weight Key Exchange with Different Passwords in the Standard Model J.O. Kwon, I.R. Jeong, D.H. Lee 1042
USF-PAS : Study on Core Security Technologies for Ubiquitous Security Framework J.H. Park 1065
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication D. Bhattacharyya, P. Das, T.-h. Kim, S.K. Bandyopadhyay 1081
Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network Y.H. Ho, A.H. Ho, K.A. Hua, F. Xie 1090
A Neural Network Based Vehicle Classification System for Pervasive Smart Road Security N. Xiong, J. He, J.H. Park, D. Cooley, Y. Li 1119