2008
2008
Volume 2, Number 1, 2008 January
-
- A Design Pattern Detection Technique that Aids Reverse Engineering, Hakjin Lee, Hyunsang Youn, Eunseok Lee (pp. 1-12).
- A New Special Biometric Identity Based Signature Scheme, Xiaodong Liu, Quan Miao, Daxing Li (pp. 13-18).
- Intelligent Search Mechanism based on Neuro-fuzzy System for the Distributed Object Groups, Romeo Mark A. Mateo and Jaewan Lee (pp. 19-28).
- Preventing Information Leakage in Secure Multiple XML Documents Publishing, Yixiang Ding, Tao Peng, Minghua Jiang (pp. 29-38).
- Host Mobility Protocol for Secure Group Communication in Wireless Mobile Environments, Miss Laiha Mat Kiah, Keith M. Martin (pp. 39-52).
- Mining User Models for Effective Adaptation of Context-aware Applications, Shiu Lun Tsang, Siobhán Clarke (pp. 53-62).
- Definition of Security Practices in Security Management Part of Security Level Management Model, Tai-Hoon Kim, Kouichi Sakurai (pp. 63-71).