2008
2008
Volume 2, Number 2, 2008 April
-
- Cryptanalysis and Improvement on Lee-Chen’s One-Time Password Authentication Scheme, Chun-Li Lin, Ching-Po Hung (pp. 1-8).
- An In-depth Analysis of Spam and Spammers, Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae Kwang Lee (pp. 9-22).
- System Study of the Wireless Multimedia Ad-hoc Network based on IEEE 802.11g, Chung-Wei Lee, Jonathan C.L. Liu, Kun Chen, Yu-Chee Tseng, S.P. Kuo (pp. 23-40).
- Personal Iris Recognition Using Neural Network, Rahib H.Abiyev, Koray Altunkaya (pp. 41-50).
- Exploring a Novel Approach for providing Software Security Using Soft Computing Systems, P. Kiran Sree (pp. 51-58).
- An Access Control Mechanism based on Permission Delegation in P2P Network, Zhang Changyou, Cao Yuanda, Liu Renfen, Li Yanhua, Cui Liang (pp. 59-70).
- Design and Implementation of Energy Aware Algorithm using Greedy Routing for Sensor Networks, Razia Haider, Muhammad Younus Javed, Naveed S. Khattak (pp. 71-86).
- Development of Effective Urban Road Traffic Management Using Workflow Techniques for Upcaming Metrocities like Lucknow (India), Manuj Darbari, Sanjay Medhavi, Abhay Kumar Srivastava (pp. 87-96).
- Color Video Sequences Encryption/Decryption Processes Using Several Color Keys Images, Rami El Sawda, Ayman Alfalou, Habib Hamam (pp. 97-106).