Previous Issue (Vol. 1, No. 2), 2012
RESPONDING TO IDENTITY CRIME ON THE INTERNETAuthor/s: Eric Holm Pages: 67-74 |
|
AUTHENTICATING DEVICES IN UBIQUITOUS COMPUTING ENVIRONMENTAuthor/s: Kamarularifin Abd Jalil, Qatrunnada Binti Abdul Rahman Pages: 75-81 |
|
AN IMAGE ENCRYPTION METHOD: SD-ADVANCED IMAGE ENCRYPTION STANDARD: SD-AIESAuthor/s: Somdip Dey Pages: 82-88 |
|
MEASURING SECURITY OF WEB SERVICES IN REQUIREMENT ENGINEERING PHASEAuthor/s: Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman, Mohammad Moein Almasi Pages: 89-98 |
|
POWER AMOUNT ANALYSIS: AN EFFICIENT MEANS TO REVEAL THE SECRETS IN CRYPTOSYSTEMSAuthor/s: Qizhi Tian, Sorin A. Huss Pages: 99-114 |
|
CERTIFICATE REVOCATION MANAGEMENT IN VANETAuthor/s: Ghassan Samara Pages: 115-121 |
|
FINITE FIELD ARITHMETIC ARCHITECTURE BASED ON CELLULAR ARRAYAuthor/s: Kee-Won Kim, Jun-Cheol Jeon Pages: 122-129 |
|
AN AIS INSPIRED ALERT REDUCTION MODELAuthor/s: Mohammad Mahboubian, Nur Izura Udzir, Shamala Subramaniam, Nor Asila Wati Abdul Hamid Pages: 130-139 |
|
TRUST MEASUREMENTS YELD DISTRIBUTED DECISION SUPPORT IN CLOUD COMPUTINGAuthor/s: Edna Dias Canedo, Rafael Timóteo de Sousa Junior, Rhandy Rafhael de Carvalho and Robson de Oliveira Albuquerque Pages: 140-151 |
|
A FORMAL SEMANTIC MODEL FOR THE ACCESS SPECIFICATION LANGUAGE RASPAuthor/s: Mark Evered Pages: 152-159 |