JOURNAL OF COMPUTERS     Vol.18  No.2     July 2007

Special issue on Mobile Computing and Security

Guest Editor :    Prof. Ren-Junn Hwang

@

1   FOREWORD
      By Ren-Junn Hwang 
2. How can wireless users identify themselves with the security issues?  -- the integrated vulnerability management system  
     By Yeu-Pong Lai, Shih-I Chou, and Guang-Yuh Su
3A Scalable ID-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks 
      By Huan-Chung Lin and Yuh-Min Tseng
4New Efficient Password Authenticated Key Exchange Protocol for Imbalanced Wireless Networks 
      By Chien-Lung Hsu, Wen-Te Lin, and Yen-Chun Chou
5. Mutually Identity Authentications in GSM-based Anonymous Communications
      By Shiuh-Jeng Wang, Yuh-Ren Tsai, Lei-Sheng Chou and I-Shan Lin
6The Design of a Novel E-cash System with the Fairness Property and Its Implementation in Wireless Communications 
     By Chih-Hung Wang and Wei-Ming Chiang
7Light-Weight Authentication and Key Exchange Protocols with Forward Secrecy for Digital Home  
      By Chun-I Fan, Tsung-Pin Chiang, and Ruei-Hau Hsu 
8. A New Routing Static Information Protection Protocol on Ad Hoc Network   
     By Wen-Chung Kuo, Jing-Hung Chen and Chi-Sung Laih
@
REGULAR SECTION:
@
9.  Visualizing Phylogenetic Trees by Spring-Embedder Models
     By Yaw-Ling Lin and Po-Shun Yu
10. Using WLAN/3G Dual-mode Terminals and an Algorithm to Enhance The Performance of Dual-mode Mobile Communication Service
     By Ching-Wen Cheng and Chyan Goei Chung
11. The Discovery of Action Groups for Smart Home
     By WHsien-Chou Liao, Bo-Yu Lai, and Sheng-Che Hsiao
@
@

  

@

@