Vol. 3, No. 4, 2008
- A Cryptographic Key Assignment Scheme with Adaptable
Time-token Constraint in a Hierarchy
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.4.01
by: Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen
- An IMS based Inter-Working Solution
for Multimedia Service in a Converged Network
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.4.02
by: Zhongwen Zhu
- Implementation of IMS-based PoC Service
with Context-Aware Interaction
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.4.03
by: Jenq-Muh Hsu, Wei-Bin Lain, Chih-Chuan Chan, Yi-Ming Huang
- I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.4.04
by: Wei-Shen Lai, Chu-Hsing Lin, Jung-Chun Liu,
Yen-Lin Huang, Mei-Chun Chou
- A Time Slot Count in Window Method
for Mobile Internet User Classification
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.4.05
by: Toshihiko Yamakami
- A recording-failure DVD playback scheme with packet reading
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.4.06
by: Chun-Yi Tsai, Shann-Chiuen Wu, Tzao-Lin Lee
- Design on SCADA Test-bed and Security Device
DOI: http://dx.doi.org/10.14257/ijmue.2008.3.4.07
by: Sungmo Jung, Jae-gu Song, Seoksoo Kim