Vol 42, No 2 (2013)

Table of Contents


Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards PDF
Debiao He, Ding Wang, Shuhua Wu 105-112
An Improved Password-Based Remote User Authentication Protocol without Smart Cards PDF
Qi Jiang, Jianfeng Ma, Guangsong Li, Zhuo Ma 113-123
Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy PDF
Wen Chung Kuo, Bae-Ling Chen, Lih-Chyau Wuu 124-130
Test Data Generation for Complex Data Types Using Imprecise Model Constraints and Constraint Solving Techniques PDF
Sarunas Packevicius, Greta Krivickaite, Dominykas Barisas, Robertas Jasaitis, Tomas Blazauskas, Evaldas Guogis 131-149
An Approach for Extracting Business Vocabularies from Business Process Models PDF
Tomas Skersys, Rimantas Butleris, Kestutis Kapocius, Tomas Vileiniskis 150-158
Efficient Revocable Multi-Receiver ID-Based Encryption PDF
Yuh–Min Tseng, Tung-Tso Tsai, Tsu-Yang Wu 159-169
Consistency Analysis of the Duration Parameter Within a Syllable for Mandarin Speech PDF
Cheng-Yu Yeh, Kuan-Lin Chen, Shaw-Hwa Hwang 170-177
A Memetic Algorithm for Solving Two Variants of the Two-Stage Uncapacitated Facility Location Problem PDF
Stefan Miškovic, Zorica Stanimirovic 178-190
A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices PDF
Sun Haiyan, Wen Qiaoyan, Zhang Hua, Jin Zhengping 191-204

Print ISSN: 1392-124X 
Online ISSN: 2335-884X