ISSN : 1796-217X
Volume : 3    Issue : 3    Date : March 2008

Article Information

Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols
Tieyan Li, Guilin Wang, and Robert H. Deng
Page(s): 1-10
Abstract  |  Full Text: PDF (492 KB)

Broadcast Authentication with Practically Unbounded One-way Chains
Bogdan Groza
Page(s): 11-20
Abstract  |  Full Text: PDF (396 KB)

Security of Distributed Digital Criminal Dossiers
Martijn Warnier, Frances Brazier, and Anja Oskamp
Page(s): 21-29
Abstract  |  Full Text: PDF (371 KB)

An Experimental Study of AJAX Application Performance
Clinton W. Smullen III and Stephanie A. Smullen
Page(s): 30-37
Abstract  |  Full Text: PDF (646 KB)

Teaching Virtual Experts for Multi-Domain Collaborative Planning
Gheorghe Tecuci, Mihai Boicu, Dorin Marcu, Marcel Barbulescu, Cristina Boicu, Vu Le, and Thomas
Page(s): 38-59
Abstract  |  Full Text: PDF (1,475 KB)

Managing Software Architectural Evolution at Multiple Levels of Abstraction
Tien N. Nguyen
Page(s): 60-70
Abstract  |  Full Text: PDF (651 KB)

From Sensors to Assisted Driving – Bridging the Gap
Marcus Tönnis, Jan-Gregor Fischer, and Gudrun Klinker
Page(s): 71-82
Abstract  |  Full Text: PDF (3,113 KB)

Quality-of-Context and its use for Protecting Privacy in Context Aware Systems
Kamran Sheikh, Maarten Wegdam, and Marten van Sinderen
Page(s): 83-93
Abstract  |  Full Text: PDF (528 KB)