2007
2007
Volume 1, Number 2, 2007 October
-
- Secure distribution of neural networks in wireless sensor networks, Joo Seung Yoon, Hee Moon Kim, Gil Ju Lee, Il Hee Kim and Yongsu Park (pp. 1-8).
- A Conference Key Distribution Scheme Using Interpolating Polynomials, Chin-Chen Chang, Chu-Hsing Lin and Chien-Yuan Chen (pp. 9-20).
- Simulation of Distributed Key Management Protocols in Clustered Wireless Sensor Networks, Jibi Abraham and K S Ramanatha (pp. 21-32).
- An Enhanced Password Authentication Scheme Providing Password Updating without Smart Cards, Chin-Chen Chang, Hao-Chuan Tsai and Yi-Hui Chen (pp. 33-40).
- Performance Analysis of Color Channel for DCT Based Image Watermarking Scheme, Vikas Saxena, Paridhi Khemka, Aditi Harsulkar and JP Gupta (pp. 41-46).
- A Scalable PKI Based on P2P Network, Zhiwei Gao, Jinsheng Fan, Yufeng Jia and Li Zhang (pp. 47-58).
- A Framework for User Privacy Protection Using Trusted Programs, Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, and Makoto Amamiya (pp. 59-70).
- Applying RFID to Secure the Pharmaceutical Supply Chain, Brian King and Xiaolan Zhang (pp. 71-84).
- A Real Time Voice Transmission Method for Voice Privacy between CDMA Mobile and PSTN Terminal, Yong-Seok Park, Kyoung-Seob Kim, Jaehwan Ahn, Choon-Soo Kim and Jae-Cheol Ryou (pp. 85-98).
- Physical Threat Description of Smart Card Protection Profile in Security Level 1st, Sang-Soo Yeo, Sang-Jo Youk, Gil-cheol Park, Seok-soo Kim and Tai-hoon Kim (pp. 99-104).