2009
2009
Volume 3, Number 1, 2009 January
-
- A Novel Mobile Content Delivery Scenario with Simple Double-Key Secure Access Control, Chih-Lin Hu and Chien-An Cho (pp. 1-16).
- Analysis of Security Policy in Practical Internet Coordinates, Xiaohan Zhao, Xiaoxiao Song, Xiao Wang, Yang Chen, Beixing Deng, Xing Li (pp. 17-30).
- Detect SYN Flooding Attack in Edge Routers, Yun Ling, Ye Gu, Guiyi Wei (pp. 31-46).
- k-anonymity Diagnosis Centre, Mohammad Reza Zare Mirakabad, Aman Jantan, Stéphane Bressan (pp. 47-64).
- Where the POP Architecture Stands among the other RFID Solutions was recalled by author because authors found some critical problems, K.H.S Sabaragamu Koralalage (pp. 65-76).
- Towards Reliable Trust Management based on Structural Trust Scopes of Distributed Roles, Gang Yin, Ning Zhou, Huaimin Wang (pp. 77-86).
- Design of Multi-Service Smart Card Systems for High Security and Performance, Mei Hong, Hui Guo (pp. 87-100).
- On Transiting Key in XML Data Transformation for Integration, Md. Sumon Shahriar and Jixue Liu (pp. 101-116).
- Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes, Mehdi Kargar (pp. 117-128).
- Person Identification through IRIS Recognition, Poulami Das, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay, Tai-hoon Kim (pp. 129-148).