Volume 2, Number 3 (September 2011) BibTex
Emerging Security Technologies and Applications
- pp. 1-3 (DOI:10.22667/JOWUA.2011.09.31.001)
Guest Editorial: Emerging Security Technologies and Applications
Fang-Yie Leu - pp. 4-25 (DOI:10.22667/JOWUA.2011.09.31.004)
Efficient and Low-Cost RFID Authentication Schemes
Atsuko Miyaji, Mohammad Shahriar Rahman, and Masakazu Soshi
[Abstract] - pp. 26-52 (DOI:10.22667/JOWUA.2011.09.31.026)
Enhancing SVO Logic for Mobile IPv6 Security Protocols
Ilsun You, Yoshiaki Hori, and Kouichi Sakurai
[Abstract] - pp. 53-73 (DOI:10.22667/JOWUA.2011.09.31.053)
A Lightweight Security Framework for Wireless Sensor Networks
Tanveer A. Zia and Albert Y. Zomaya
[Abstract] - pp. 74-84 (DOI:10.22667/JOWUA.2011.09.31.074)
A Proxy E-Raffle Protocol Based on Proxy Signatures
Nasrollah Pakniat and Ziba Eslami
[Abstract] - pp. 85-95 (DOI:10.22667/JOWUA.2011.09.31.085)
Mobile Banking Payment System
Fuw-Yi Yang, Zhen-Wei Liu, and Su-Hui Chiu
[Abstract] - pp. 96-107 (DOI:10.22667/JOWUA.2011.09.31.096)
Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA
and Stream Ciphering for Users Known to Each Other
Yi-Li Huang and Fang-Yie Leu
[Abstract]Sponsored byDatabase and Network Security lab. at Tunghai University, Taiwan (directed by Prof. Fang-Yie Leu, http://dblab.csie.thu.edu.tw).[Return to Archives]