default search action
Journal of Research and Practice in Information Technology, Volume 40
Volume 40, Number 1, 2008
- Sidney A. Morris:
Editorial. 1 - Chad Lin, Graham Pervan, Hsiu-Yuan Tsao, Koong H.-C. Lin:
An Investigation into Business-to-Business Electronic Commerce Organizations. 3-18 - Tom McBride:
A Model for Investigating Software Accidents. 19-32 - Nan Tang, Jeffrey Xu Yu, Kam-Fai Wong, Jianxin Li:
Fast XML Structural Join Algorithms by Partitioning. 33-54 - Jian Weng, Shengli Liu, Kefei Chen, Xiangxue Li:
Identity-Based Parallel Key-Insulated Signature: Framework and Construction. 55-68
Volume 40, Number 2, 2008
- Sidney A. Morris:
Editorial. 69 - Tapio Litmanen, Anu Tulkkanen:
Global Sense of Risk: Media Reporting on Scientific Studies and Potential Risk of Mobile Phones. 71-90 - Gwan-Hwan Hwang, Hsin-Fu Lin, Chun-Chin Sy, Chiu-Yang Chang:
The Design and Implementation of Appointed File Prefetching for Distributed File Systems. 91-108 - Esam Khan, M. Watheq El-Kharashi, Fayez Gebali, Mostafa I. H. Abd-El-Barr:
Design Space Exploration of a Reconfigurable HMAC-Hash Unit. 109-128 - Ashfaqur Rahman, M. Manzur Murshed:
Dynamic Texture Synthesis Using Motion Distribution Statistics. 129-148
Volume 40, Number 3, 2008
- Ljiljana Brankovic, Mirka Miller, Chris Steketee:
Guest Editorial. 149 - Kirsten Wahlstrom, Gerald Quirchmayr:
A Privacy-Enhancing Architecture for Databases. 151-162 - Adepele Williams, Ken Barker:
Controlling Inference: Avoiding P-level Reduction During Analysis. 163-186 - Vijayakrishnan Pasupathinathan, Josef Pieprzyk, Huaxiong Wang:
Security Analysis of Australian and E.U. E-passport Implementation. 187-206 - Volker Fusenig, Dagmara Spiewak, Thomas Engel:
Anonymous Communication in Multi Hop Wireless Networks. 207-228
Volume 40, Number 4, 2008
- Ljiljana Brankovic, Mirka Miller, Chris Steketee:
Guest Editorial. 229 - Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens:
Deploying Access and Flow Control in Distributed Workflows. 231-254 - Pino Caballero-Gil, Amparo Fúster-Sabater, Oscar Delgado-Mohatar:
Linear Cellular Automata as Discrete Models for Generating Cryptographic Sequences. 255-262 - Josep M. Miret, Rosana Tomàs, Magda Valls, Daniel Sadornil, Juan Tena:
Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves. 263-274 - Kun Peng, Feng Bao, Ed Dawson:
Correct, Private, Flexible and Efficient Range Test. 275-289
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.