JOURNAL OF COMPUTERS     Vol.22  No.4     January 2012

¡@

1. An Efficient Authentication Mechanism for (2, 2)-Visual Cryptography Scheme
     Yi-Hui Chen For full article CEPS
2. Digital Text Categorization Based on Directional Term Structures
     Chia-Chuan Wu and Jau-Ji Shen For full article CEPS
3An Improved Protocol for Password Authentication Using Smart Cards
     Zi-Yao Cheng, Yun Liu, Chin-Chen Chang, and Shih-Chang Chang For full article CEPS
4. A Localization Parameter Estimation Model for CKN-based Wireless Sensor Networks
    Yuan-Fang Chen, Ming-Chu Li, and Xue-Chao Cheng For full article CEPS
5. A Data Hiding Scheme based on Voronoi Diagram
     Shi-Yu Cui, Zhi-Hui Wang, Chin-Chen Chang, and Ming-Chu Li For full article CEPS
6. Applying Personalized Tag Group Recommendation Model to Social Photo Sharing
    Tao Zhang and Guijia He For full article CEPS
    

  

¡@

¡@