Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
Home
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Current
Archives
Search
Search
Register
Login
Search
Search
Home
>
Archives
>
Vol. 42 No. 2 (2013)
Vol. 42 No. 2 (2013)
Published:
2013-06-11
Articles
Cryptanalysis and Improvement of a Password-Based Remote User Authentication Scheme without Smart Cards
Debiao He, Ding Wang, Shuhua Wu
105-112
PDF
An Improved Password-Based Remote User Authentication Protocol without Smart Cards
Qi Jiang, Jianfeng Ma, Guangsong Li, Zhuo Ma
113-123
PDF
Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy
Wen Chung Kuo, Bae-Ling Chen, Lih-Chyau Wuu
124-130
PDF
Test Data Generation for Complex Data Types Using Imprecise Model Constraints and Constraint Solving Techniques
Sarunas Packevicius, Greta Krivickaite, Dominykas Barisas, Robertas Jasaitis, Tomas Blazauskas, Evaldas Guogis
131-149
PDF
An Approach for Extracting Business Vocabularies from Business Process Models
Tomas Skersys, Rimantas Butleris, Kestutis Kapocius, Tomas Vileiniskis
150-158
PDF
Efficient Revocable Multi-Receiver ID-Based Encryption
Yuh–Min Tseng, Tung-Tso Tsai, Tsu-Yang Wu
159-169
PDF
Consistency Analysis of the Duration Parameter Within a Syllable for Mandarin Speech
Cheng-Yu Yeh, Kuan-Lin Chen, Shaw-Hwa Hwang
170-177
PDF
A Memetic Algorithm for Solving Two Variants of the Two-Stage Uncapacitated Facility Location Problem
Stefan Miškovic, Zorica Stanimirovic
178-190
PDF
A Strongly Secure Pairing-free Certificateless Authenticated Key Agreement Protocol for Low-Power Devices
Sun Haiyan, Wen Qiaoyan, Zhang Hua, Jin Zhengping
191-204
PDF
SUMMARIES
SUMMARIES
205-208
PDF
Information
For Readers
For Authors
For Librarians