Abstract is missing.
- The Effectiveness of Intersection Attack Countermeasures for Graphical PasswordsRosanne English, Ron Poet. 1-8 [doi]
- Divide and Conquer: An Efficient Attack on Yahoo! CAPTCHAHaichang Gao, Wei Wang, Ye Fan. 9-16 [doi]
- Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry ModeJohannes Barnickel, Jian Wang, Ulrike Meyer. 17-24 [doi]
- Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlationZhijun Wu, Lan Ma, Minghua Wang, Meng Yue, Lu Wang. 25-32 [doi]
- Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack DetectionZhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu. 33-40 [doi]
- A Taxonomy of Trust and Reputation System AttacksDavid Fraga, Zorana Bankovic, José Manuel Moya. 41-50 [doi]
- An Active Detection Mechanism for Detecting ICMP Based AttacksFerdous A. Barbhuiya, S. Roopa, Ritesh Ratti, Santosh Biswas, Sukumar Nandi. 51-58 [doi]
- Robust Biometric Based Key Agreement and Remote Mutual AuthenticationHisham Al-Assam, Sabah Jassim. 59-65 [doi]
- A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint AuthenticationWenCheng Yang, Jiankun Hu, Song Wang. 66-70 [doi]
- RFID Mutual Authentication and Secret Update Protocol for Low-Cost TagsMohamed A. Sharaf. 71-77 [doi]
- A Hybrid Authentication and Key Establishment Scheme for WBANWassim Drira, Éric Renault, Djamal Zeghlache. 78-83 [doi]
- Towards a Formal Verification of a Multi-factor Authentication Protocol Using Automated Theorem ProversEduardo dos Santos, Jean Everson Martina, Ricardo Felipe Custódio. 84-91 [doi]
- Data Integration in Presence of Authorization PoliciesMehdi Haddad, Mohand-Said Hacid, Robert Laurini. 92-99 [doi]
- Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud ComputingQiwei Lu, Yan Xiong, Xudong Gong, Wenchao Huang. 100-108 [doi]
- Fusion of Opinions under Uncertainty and Conflict - Application to Trust Assessment for Cloud MarketplacesSheikh Mahbub Habib, Sebastian Ries, Sascha Hauke, Max Mühlhäuser. 109-118 [doi]
- TSD: A Flexible Root of Trust for the CloudDexian Chang, XiaoBo Chu, Yu Qin, Dengguo Feng. 119-126 [doi]
- Clouds Trust AnchorsImad M. Abbadi. 127-136 [doi]
- Tracking of Data Leaving the CloudYu Shyang Tan, Ryan K. L. Ko, Peter Jagadpramana, Chun Hui Suen, Markus Kirchberg, Teck Hooi Lim, Bu-Sung Lee, Anurag Singla, Ken Mermoud, Doron Keller, Ha Duc. 137-144 [doi]
- TREASURE: Trust Enhanced Security for Cloud EnvironmentsVijay Varadharajan, Udaya Kiran Tupakula. 145-152 [doi]
- Confidentiality as a Service - Usable Security for the CloudSascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith. 153-162 [doi]
- Constructing a Cloud-Based IDS by Merging VMI with FMAChristopher Harrison, Devin Cook, Robert McGraw, John A. Hamilton Jr.. 163-169 [doi]
- AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud ComputingSafwan Mahmud Khan, Kevin W. Hamlen. 170-176 [doi]
- Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World EnvironmentsNicholas Charles Patterson, Michael Hobbs, Jemal H. Abawajy. 177-184 [doi]
- Efficient Missing Tag Detection in a Large RFID SystemCunqing Ma, Jingqiang Lin, Yuewu Wang. 185-192 [doi]
- Cheater Detection in Vehicular NetworksDijiang Huang, Sean A. Williams, Swaroop Shere. 193-200 [doi]
- A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate ArraysQuang-Anh Tran, Frank Jiang, Jiankun Hu. 201-208 [doi]
- A Practical Network-Based Intrusion Detection and Prevention SystemNaruemon Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, Chalermpol Charnsripinyo. 209-214 [doi]
- VicSifter: A Collaborative DDoS Detection System with Lightweight Victim IdentificationFei Wang 0007, Xiaofeng Wang, Jinshu Su, Bin Xiao. 215-222 [doi]
- Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection EnvironmentYuxin Meng, Wenjuan Li. 223-230 [doi]
- An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETsLeovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro. 231-238 [doi]
- A Multivariate Classification Algorithm for Malicious Node Detection in Large-Scale WSNsHongjun Dai, Huabo Liu, Zhiping Jia, Tianzhou Chen. 239-245 [doi]
- Detecting Imprudence of 'Reliable' Sellers in Online Auction SitesXin Liu, Anwitaman Datta, Hui Fang, Jie Zhang. 246-253 [doi]
- A Novel Scoring Model to Detect Potential Malicious Web PagesVan Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk. 254-263 [doi]
- Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic AnalysisLei (Chris) Liu, Xiaolong Jin, Geyong Min, Li Xu. 264-270 [doi]
- Provably Secure Single Sign-on Scheme in Distributed Systems and NetworksJiangshan Yu, Guilin Wang, Yi Mu. 271-278 [doi]
- Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart GridMohammad Ashiqur Rahman, Libin Bai, Mohamed Shehab, Ehab Al-Shaer. 279-286 [doi]
- Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer NetworkGuanghai Cui, MingChu Li, Zhen Wang, Linlin Tian, Jianhua Ma. 287-294 [doi]
- Efficient and Provably-Secure Group Key Management Scheme Using Key DerivationYi-Ruei Chen, Wen-Guey Tzeng. 295-302 [doi]
- Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETsYuanbo Guo, Jianfeng Ma, Chao Wang, Liang-min Wang. 303-309 [doi]
- A Secure Distributed File System Based on Revised Blakley's Secret Sharing SchemeSu Chen, Yi Chen 0001, Hai Jiang, Laurence Tianruo Yang, Kuan-Ching Li. 310-317 [doi]
- Efficient Contextual Transaction Trust Computation in E-commerce EnvironmentsHaibin Zhang, Yan Wang, Xiuzhen Zhang. 318-325 [doi]
- Building Robust Reputation Systems in the E-commerce EnvironmentHuiying Duan, Feifei Liu. 326-333 [doi]
- Feedback as "Shadow of the Present": An Alternative to Reputation Systems for E-marketplacesQin Li, Jie Zhang, Keith M. Martin. 334-341 [doi]
- Security Attribute Aggregation Models for E-research CollaborationsRichard O. Sinnott, Christopher Bayliss, Gerson Galang, Damien Mannix, Martin Tomko. 342-349 [doi]
- Determining the Optimal Reporting Strategy in Competitive E-marketplacesZeinab Noorian, Jie Zhang, Michael Fleming, Stephen Marsh. 350-357 [doi]
- K-Anonymous Cloaking Algorithm Based on Weighted Adjacency Graph for Preserving Location PrivacyAmina Hossain, Al-Amin Hossain, Sung-Jae Jang, Young-Sung Shin, Jae-Woo Chang. 358-365 [doi]
- Measuring Anonymity by Profiling Probability DistributionsRajiv Bagai, Nan Jiang. 366-374 [doi]
- How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance EvaluationMichael Brenner, Henning Perl, Matthew Smith. 375-382 [doi]
- A Privacy Preserving Application Acquisition ProtocolRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 383-392 [doi]
- An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETsYu-Chih Wei, Yi-Ming Chen. 393-400 [doi]
- Reputation Diffusion Simulation for Avoiding Privacy ViolationDavid Pergament, Armen Aghasaryan, Jean-Gabriel Ganascia. 401-408 [doi]
- Ring Group SignaturesLiqun Chen. 409-418 [doi]
- GridPriv: A Smart Metering Architecture Offering k-AnonymityMark Stegelmann, Dogan Kesdogan. 419-426 [doi]
- Anonymity and Transferability for an Electronic Bank Check SchemeM. Francisca Hinarejos, Josep Lluís Ferrer-Gomila, Gerard Draper-Gil, Llorenç Huguet i Rotger. 427-435 [doi]
- Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGALingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing, Yuan Ma. 436-442 [doi]
- Sufficient Encryption with Codewords and Bin-strings of H.264/SVCMamoona Naveed Asghar, Mohammad Ghanbari, Martin J. Reed. 443-450 [doi]
- Anonymous Networking Meets Real-World Business RequirementsMark Vinkovits, Erion Elmasllari, Claudio Pastrone. 451-457 [doi]
- Subversion Impedance in Covert Communication NetworksTimothy Nix, Riccardo Bettati. 458-465 [doi]
- Simulatable Oblivious Transfer Protocols Based on Blind SignatureJ. Qin, J. Hu, H. Zhao. 466-473 [doi]
- Ginger: An Access Control Framework for Telematics ApplicationsDavid Herges, Naim Asaj, Bastian Könings, Florian Schaub, Michael Weber 0001. 474-481 [doi]
- Overhauling of a ASEA Robot IR6 with Open ArchitectureM. H. S. Bomfim, R. A. Gontijo, Alexandre Queiroz Bracarense, Eduardo Jose Lima II. 482-489 [doi]
- Classification of Correlated Internet Traffic FlowsJun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou. 490-496 [doi]
- Cooperative Trajectory-Based Map ConstructionWei Chang, Jie Wu 0001, Chiu Chiang Tan. 497-504 [doi]
- Messing with Android's Permission ModelAndre Egners, Ulrike Meyer, Björn Marschollek. 505-514 [doi]
- Wire - A Formal Intermediate Language for Binary AnalysisSilvio Cesare, Yang Xiang. 515-524 [doi]
- SEAMS: A Signaling Layer for End-Host-Assisted Middlebox ServicesRené Hummen, Jan Henrik Ziegeldorf, Tobias Heer, Hanno Wirtz, Klaus Wehrle. 525-532 [doi]
- An Analytical Model on the Propagation of Modern Email WormsWei Zhou, Sheng Wen, Yini Wang, Yang Xiang, Wanlei Zhou. 533-540 [doi]
- Analysis of SIP-Based Threats Using a VoIP Honeynet SystemDirk Hoffstadt, Alexander Marold, Erwin P. Rathgeb. 541-548 [doi]
- Multiplayer Game Technology to Manage Critical Infrastructure ProtectionLaura Pla Beltran, Madjid Merabti, Qi Shi. 549-556 [doi]
- FACIUS: An Easy-to-Deploy SAML-based Approach to Federate Non Web-Based ServicesJens Köhler, Sebastian Labitzke, Michael Simon, Martin Nussbaumer, Hannes Hartenstein. 557-564 [doi]
- Provable Data Possession Using Sigma-protocolsAkshaya Mohan, Rajendra Katti. 565-572 [doi]
- Towards Safe and Optimal Network Designs Based on Network Security RequirementsNihel Ben Youssef Ben Souayeh, Adel Bouhoula. 573-579 [doi]
- Mechanism Design Based Secure Data Object ReplicationMinzhe Guo, Prabir Bhattacharya. 580-587 [doi]
- HyperDomain: Enabling Inspection of Malicious VMM's MisbehaviorWenyin Yang, Li Ma. 588-595 [doi]
- Image Resizing Based on Geometry Preservation with Seam CarvingFan Zhou, Ruomei Wang, Yu Liu, Yun Liang. 596-601 [doi]
- An MCL-Based Approach for Spam Profile Detection in Online Social NetworksFaraz Ahmed, Muhammad Abulaish. 602-608 [doi]
- Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious UsersYong Wang, Ting-ting Zhang, Hong-Zong Li, Long-Ping He, Jing Peng. 609-615 [doi]
- IRIS: A Novel Method of Direct Trust Computation for Generating Trusted Social NetworksSana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia. 616-623 [doi]
- Multiple QoT Constrained Social Trust Path Selection in Complex Social NetworksGuanfeng Liu, Yan Wang 0002, Duncan S. Wong. 624-631 [doi]
- Effects of Social Characters in Viral Propagation Seeding Strategies in Online Social NetworksAlessio Bonti, Ming Li, Longxiang Gao, Wen Shi. 632-639 [doi]
- Evaluating User Community Influence in Online Social NetworksZhengli Xiong, Wenjun Jiang, Guojun Wang. 640-647 [doi]
- Optimal State Management of Data Sharing in Online Social Network (OSN) ServicesJoon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat. 648-655 [doi]
- A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANETQiwei Lu, Yan Xiong, Wenchao Huang, Xudong Gong, Fuyou Miao. 656-665 [doi]
- Unwanted Traffic Control via Hybrid Trust ManagementZheng Yan, Raimo Kantola, Yue Shen. 666-673 [doi]
- Offline RFID Grouping Proofs with Trusted TimestampsCunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang. 674-681 [doi]
- A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic InvestigationsGraeme Horsman, Christopher Laing, Paul Vickers. 682-689 [doi]
- Confidence as a Means to Assess the Accuracy of Trust Values Rolf Kiefhaber, Gerrit Anders, Florian Siefert, Theo Ungerer, Wolfgang Reif. 690-697 [doi]
- A Generalized Stereotypical Trust ModelHui Fang, Jie Zhang, Murat Sensoy, Nadia Magnenat-Thalmann. 698-705 [doi]
- Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor NetworksHuawei Zhao, Jiankun Hu, Jing Qin, Vijay Varadharajan, Haishan Wan. 706-713 [doi]
- Trusted Administration of Large-Scale Cryptographic Role-Based Access Control SystemsLan Zhou, Vijay Varadharajan, Michael Hitchens. 714-721 [doi]
- A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed NetworksJoydeep Chandra, Ingo Scholtes, Niloy Ganguly, Frank Schweitzer. 722-729 [doi]
- A New Efficient Property-Based Attestation Protocol Based on Elliptic CurvesXiaoBo Chu, Qin Yu. 730-736 [doi]
- Reusable and Extensible Fault Tolerance for RESTful ApplicationsJohn Edstrom, Eli Tilevich. 737-744 [doi]
- An Area-Based Approach for Node Replica Detection in Wireless Sensor NetworksWibhada Naruephiphat, Yusheng Ji, Chalermpol Charnsripinyo. 745-750 [doi]
- Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor NetworksMiao Xie, Jiankun Hu, Biming Tian. 751-759 [doi]
- Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake SourcesArshad Jhumka, Matthew Bradbury, Matthew Leeke. 760-768 [doi]
- A Hybrid Key Management Protocol for Wireless Sensor NetworksMusfiq Rahman, Srinivas Sampalli. 769-776 [doi]
- Secure Sector Based Bi-path Clustering and Routing Protocol for WSNsYihong Zang, Johnson P. Thomas, Gheorghita Ghinea, Mathews Thomas, Salaheddin Darwish. 777-784 [doi]
- Modelling of Secure Data Transmission over a Multichannel Wireless Network in AlloyAliaa M. Alabdali, Lilia Georgieva, Greg Michaelson. 785-792 [doi]
- Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh NetworksQijun Gu, Wanyu Zang, Meng Yu, Peng Liu. 793-800 [doi]
- Evaluation Criteria for Future Identity ManagementJesse Leskinen. 801-806 [doi]
- Privacy-Preserving Statistical Analysis Method for Real-World DataJun Ishii, Hiroyuki Maeomichi, Ikuo Yoda. 807-812 [doi]
- The Multi-layer Imbrication for Data Leakage Prevention from Mobile DevicesCharles Perez, Babiga Birregah, Marc Lemercier. 813-819 [doi]
- Gemini: A Handbag for Pervasive Social CommunicationsYu Chen, Zheng Yan. 820-825 [doi]
- Adaptive Trust Management Mechanism for Cognitive Radio NetworksQingqi Pei, Lei Li, Hongning Li, Beibei Yuan. 826-831 [doi]
- An Identity Authentication Mechanism Based on Timing Covert ChannelYanan Sun, Xiaohong Guan, Ting Liu, Yu Qu. 832-836 [doi]
- A Privacy Preserving Scalable Architecture for Collaborative Event CorrelationHani Qusa, Roberto Baldoni, Roberto Beraldi. 837-843 [doi]
- Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud StorageZhiqian Xu, Keith M. Martin. 844-849 [doi]
- Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email AddressesTobias Hahn, Thomas Kunz, Markus Schneider 0002, Sven Vowe. 850-856 [doi]
- Insider Attacks in Cloud ComputingAdrian J. Duncan, Sadie Creese, Michael Goldsmith. 857-862 [doi]
- Resources Collaborative Scheduling Model Based on Trust Mechanism in CloudKun Lu, Hua Jiang, MingChu Li, Sheng Zhao, Jianhua Ma. 863-868 [doi]
- Security and Trust Preserving VM Migrations in Public CloudsMudassar Aslam, Christian Gehrmann, Mats Björkman. 869-876 [doi]
- WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OSCaner Kilinc, Todd Booth, Karl Andersson. 877-883 [doi]
- A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor NetworksYongzhao Zhan, Chunxia Li, Xinsheng Wang, Yuan Zhou, Lu Liu, Hussain Al-Aqrabi. 884-889 [doi]
- A Rapid Certification Protocol from Bilinear Pairings for Vehicular Ad Hoc NetworksXiaojun Li, Liangmin Wang. 890-895 [doi]
- Reputation Based Security Model for Android ApplicationsWelderufael Berhane Tesfay, Todd Booth, Karl Andersson. 896-901 [doi]
- An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANETPramod Kumar Singh, Govind Sharma. 902-906 [doi]
- Effects of IDSs on the WSNs Lifetime: Evidence of the Need of New ApproachesKrishna Doddapaneni, Enver Ever, Orhan Gemikonakli, Leonardo Mostarda, Alfredo Navarra. 907-912 [doi]
- Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor NetworksIsmail Mansour, Gérard Chalhoub, Bassem Bakhache. 913-919 [doi]
- An Investigation into the Evolution of Security Usage in Home Wireless NetworksThomas Stimpson, Lu Liu, Yongzhao Zhan. 920-925 [doi]
- Security Server-Based Architecture for Mobile Ad Hoc NetworksSalaheddin Darwish, Simon J. E. Taylor, Gheorghita Ghinea. 926-930 [doi]
- CONDOR: A Hybrid IDS to Offer Improved Intrusion DetectionDavid J. Day, Denys A. Flores, Harjinder Singh Lallie. 931-936 [doi]
- An SLA-based Framework for Estimating Trustworthiness of a CloudSudip Chakraborty, Krishnendu Roy. 937-942 [doi]
- A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive EnvironmentsChi Lin, Guowei Wu, Lin Yao, Zuosong Liu. 943-948 [doi]
- Enhancing User Identity Privacy in LTEHiten Choudhury, Basav Roychoudhury, Dilip K. Saikia. 949-957 [doi]
- Privacy-Preserving Digital Rights Management in a Trusted Cloud EnvironmentRonald Petrlic. 958-963 [doi]
- ILACF: An Incentive-Based Low-Latency Anonymous Communication FrameworkXin Chen, Qiao-lin Hu, Hao Lu, Ge-Ming Xia, Jun Long. 964-969 [doi]
- A Covert Timing Channel Based on Fountain CodesRennie Archibald, Dipak Ghosal. 970-977 [doi]
- A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor NetworksMuhammad Bashir Abdullahi, Guojun Wang. 978-985 [doi]
- Network Coding-Based Mutual Anonymity Communication Protocol for Mobile P2P NetworksZhi-yuan Li, Liang-min Wang, Si-guang Chen. 986-991 [doi]
- A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an ExampleStefan Hofbauer, Kristian Beckers, Gerald Quirchmayr, Christoph Sorge. 992-997 [doi]
- Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of ThingsDennis Gessner, Alexis Olivereau, Alexander Salinas Segura, Alexandru Serbanati. 998-1003 [doi]
- Design and Evaluation of SensorSafe: A Framework for Achieving Behavioral Privacy in Sharing Personal Sensory InformationHaksoo Choi, Supriyo Chakraborty, Mani B. Srivastava. 1004-1011 [doi]
- Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation FrameworkChunhua Su, Guilin Wang, Kouichi Sakurai. 1012-1017 [doi]
- A Light-Weight Commodity Integrity Detection Algorithm Based on Chinese Remainder TheoremChaoliang Li, Guojun Wang. 1018-1023 [doi]
- An Architecture for the Enforcement of Privacy and Security Requirements in Internet-Centric ServicesYair Diaz-Tellez, Eliane L. Bodanese, Srijith K. Nair, Theo Dimitrakos. 1024-1031 [doi]
- A Quantum-classical Hybrid Architecture for Security Algorithms AccelerationRafael Trapani Possignolo, Cintia B. Margi. 1032-1037 [doi]
- A Quantum TITO Diversity Transmission Scheme with Quantum Teleportation of Non-maximally Entangled Bell StateJinjing Shi, Ronghua Shi, Ying Guo, Moon Ho Lee. 1038-1041 [doi]
- Information Security of IPsec-based Mobile VPN: Authentication and Encryption Algorithms PerformanceAlexander V. Uskov. 1042-1048 [doi]
- Inflammation Security: A Decentralised Immune Model for Resource Distribution in NetworksMark Heydenrych, Elizabeth Ehlers. 1049-1056 [doi]
- Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple ReceiversHuaqun Wang, Yuqing Zhang, Bo Qin. 1057-1062 [doi]
- Assuring Data Privacy in Cloud TransformationsTom Kirkham, Django Armstrong, Karim Djemame, Marcelo Corrales, Mariam Kiran, Iheanyi Nwankwo, Ming Jiang, Nikolaus Forgó. 1063-1069 [doi]
- BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical InputsDingning Yang, Yuqing Zhang, Qixu Liu. 1070-1076 [doi]
- A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor NetworksRamzi Bellazreg, Noureddine Boudriga, Mohamed Hamdi. 1077-1082 [doi]
- Static Detection of Logic Vulnerabilities in Java Web ApplicationsYing Kong, Yuqing Zhang, Zhejun Fang, Qixu Liu. 1083-1088 [doi]
- A Multi-agent Immunologically-inspired Model for Critical Information Infrastructure Protection - An Immunologically-inspired Conceptual Model for Security on the Power GridSheu M. A. Mavee, Elizabeth Marie Ehlers. 1089-1096 [doi]
- Autonomous Group-Based Authentication Mechanism in Mobile Ad Hoc NetworksParisa Memarmoshrefi, Omar Alfandi, Ansgar Kellner, Dieter Hogrefe. 1097-1102 [doi]
- A Trust Model Based on P2P Trust Models for Secure Global GridsDamandeep Kaur, Jyotsna Sengupta. 1103-1108 [doi]
- Design and Implementation of Facebook Crawler Based on Interaction SimulationZhefeng Xiao, Bo Liu, Huaping Hu, Tian Zhang. 1109-1112 [doi]
- More Choices, More Control: Extending Access Control by Meta-rights ReallocationAdnan Ahmad, Brian Whitworth, Lech J. Janczewski. 1113-1118 [doi]
- Assessing Overhead Cost Associated with Encrypting Swap FileBushra AlBelooshi, K. Salah, T. Marin, A. Bentiba. 1119-1123 [doi]
- A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social NetworksSadie Creese, Michael Goldsmith, Jason R. C. Nurse, Elizabeth Phillips. 1124-1131 [doi]
- Detection and Prevention of Data Manipulation from Client Side in Web ApplicationsMohammad Ghafari, Hamid Shoja, Mohammad Yosef Amirani. 1132-1136 [doi]
- Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud SecuritySyed Naqvi, Arnaud Michot, Michael Van de Borne. 1137-1142 [doi]
- Cloud SSDLC: Cloud Security Governance Deployment Framework in Secure System Development Life CycleTien-Cheu Kao, Ching-Hao Mao, Chien-Yu Chang, Kai-Chi Chang. 1143-1148 [doi]
- On Increasing the Computational Efficiency of Long Integer Multiplication on FPGAIsmail San, Nuray At. 1149-1154 [doi]
- A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone PlatformsMartin Pirker, Daniel Slamanig. 1155-1160 [doi]
- Experimenting with ARM TrustZone - Or: How I Met Friendly Piece of Trusted HardwareJohannes Winter. 1161-1166 [doi]
- Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP AddressesFahd Al-Haidari, Mohammed H. Sqalli, Khaled Salah. 1167-1174 [doi]
- Locating the Attacker of Wormhole Attack by Using the HoneypotT. Divya Sai Keerthi, Pallapa Venkataram. 1175-1180 [doi]
- Malicious AODV: Implementation and Analysis of Routing Attacks in MANETsHumaira Ehsan, Farrukh Aslam Khan. 1181-1187 [doi]
- Securing Trusted Execution Environments with PUF Generated Secret KeysMatthew Areno, Jim Plusquellic. 1188-1193 [doi]
- Restricted Identification without Group KeysLucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Miroslaw Kutylowski. 1194-1199 [doi]
- On a Visual Secret Sharing Scheme with High Quality DecryptionVipin Kumar, Chirag Chetan, Aparajita Ojha. 1200-1203 [doi]
- Toward Authenticated and Complete Query Results from Cloud StoragesFu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen. 1204-1209 [doi]
- Security Issues of a Publicly Accessible Cloud Computing InfrastructureGordon Russell, Richard Macfarlane. 1210-1216 [doi]
- File Exchange in CloudRafael Timóteo de Sousa Júnior, Edna Dias Canedo, Robson de Oliveira Albuquerque, Flavio Elias Gomes de Deus. 1217-1222 [doi]
- Towards Semantic-Enhanced Attribute-Based Access Control for Cloud ServicesZahid Iqbal, Josef Noll. 1223-1230 [doi]
- Self-Protecting Documents for Cloud Storage SecurityManuel Munier, Vincent Lalanne, Magali Ricarde. 1231-1238 [doi]
- Border Gateway Protocol Anomaly Detection Using Failure Quality Control MethodMuhammad Mujtaba, Priyadarsi Nanda, Xiangjian He. 1239-1244 [doi]
- AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNsLongxiang Gao, Ming Li, Tianqing Zhu, Alessio Bonti, Wanlei Zhou, Shui Yu. 1245-1250 [doi]
- Android Malware Detection via a Latent Network Behavior AnalysisTe-En Wei, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee, Horng-Tzer Wang, Dong-Jie Wu. 1251-1258 [doi]
- A Layered Malware Detection Model Using VMMLin Chen, Bo Liu, Huaping Hu, Qianbing Zheng. 1259-1264 [doi]
- Distributed Privacy Preserving Classification Based on Local Cluster IdentifiersNico Schlitter, Jörg Lässig. 1265-1272 [doi]
- Privacy Protecting by Multiattribute Clustering in Data-Intensive ServiceQing Zhu, Ning Li. 1273-1278 [doi]
- Fuzzy Logic Election of Node for Routing in WSNsShaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar, Omar Alfandi, Dieter Hogrefe. 1279-1284 [doi]
- Location-Based Authentication and Authorization Using Smart PhonesFeng Zhang, Aron Kondoro, Sead Muftic. 1285-1292 [doi]
- A Formally Verified Device Authentication Protocol Using Casper/FDRMahdi Aiash, Glenford E. Mapp, Raphael C.-W. Phan, Aboubaker Lasebae, Jonathan Loo. 1293-1298 [doi]
- Provably Secure Two-Party Explicit Authenticated Key Agreement ProtocolMinghui Zheng, Jing Chen. 1299-1303 [doi]
- Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating SystemMohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Ramlan Mahmod, Hanunah Othman. 1304-1309 [doi]
- Performance Evaluation of Shared Hosting Security MethodsSeyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan. 1310-1315 [doi]
- Security Aspects of Soft Verified Messages Protected by Message Authentication CodesNatasa Zivic. 1316-1322 [doi]
- Using Subjective Logic to Handle Uncertainty and ConflictsMurat Sensoy, Jeff Z. Pan, Achille Fokoue, Mudhakar Srivatsa, Felipe Meneguzzi. 1323-1326 [doi]
- Random4: An Application Specific Randomized Encryption Algorithm to Prevent SQL InjectionSrinivas Avireddy, Varalakshmi Perumal, Narayan Gowraj, Ram Srivatsa Kannan, Prashanth Thinakaran, Sundaravadanam Ganapthi, Jashwant Raj Gunasekaran, Sruthi Prabhu. 1327-1333 [doi]
- A Multi-tunnel VPN Concurrent System for New Generation Network Based on User SpaceYan Shen, Qi-fei Zhang, Ling-di Ping, Yan-fei Wang, Wen-juan Li. 1334-1341 [doi]
- Development of a Typing Behaviour Recognition Mechanism on AndroidXuan Huang, Geoffrey Lund, Andrew Sapeluk. 1342-1347 [doi]
- Domain Name to IP Address Resolution System with Multiple Name Servers Adaptable to MANETsYounchan Jung, Marnel Peradilla. 1348-1357 [doi]
- A Scalable Anonymity Scheme Based on DHT Distributed InquiryWentao Wang, Yuewu Wang, Jiwu Jing, Zhongwen Zhang. 1358-1363 [doi]
- Secure Reputation Framework for BitTorrentHani Ragab Hassen, Olga Jones, Nikos Galanis. 1364-1369 [doi]
- RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based AnalysisIsmail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Ching-Hao Mao, Te-En Wei, Shyi-Ming Chen. 1370-1375 [doi]
- An Attribute-Based Encryption Scheme Secure against Malicious KGCGuoyan Zhang, Lei Liu, Yang Liu. 1376-1380 [doi]
- Social Network Content Management through WatermarkingAthanasios Zigomitros, Achilleas Papageorgiou, Constantinos Patsakis. 1381-1386 [doi]
- U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social NetworksLorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda. 1387-1392 [doi]
- Mitigating SPIT with Social StrengthM. Ajmal Azad, Ricardo Morla. 1393-1398 [doi]
- Evolution of Cooperation Based on Reputation on Dynamical NetworksLinlin Tian, MingChu Li, Weifeng Sun, Xiaowei Zhao, Baohui Wang, Jianhua Ma. 1399-1404 [doi]
- Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help?Sanat Kumar Bista, Surya Nepal, Cécile Paris. 1405-1410 [doi]
- Practicable Unified Security, Trust and Privacy (STP) Framework for Federated Access Management (FAM)Jamalul-lail Ab Manan, Zubair Ahmad Khattak, Suziah Sulaiman. 1411-1416 [doi]
- Evaluation of Trustworthiness of Reviews in the Online Travel CommunityYifang Ku, Hsiao-Hui Li, Fan Wu. 1417-1422 [doi]
- Research on Trust Issue of Current Chinese C2C E-commerce: Problems and SolutionsYu Zhang. 1423-1428 [doi]
- How to Track Your Data: Rule-Based Data Provenance Tracing AlgorithmsOlive Qing Zhang, Ryan K. L. Ko, Markus Kirchberg, Chun Hui Suen, Peter Jagadpramana, Bu-Sung Lee. 1429-1437 [doi]
- VehiCloud: Cloud Computing Facilitating Routing in Vehicular NetworksYang Qin, Dijiang Huang, Xinwen Zhang. 1438-1445 [doi]
- Geographic-Based Service Request Scheduling Model for Mobile Cloud ComputingTianyi Xing, Hongbin Liang, Dijiang Huang, Lin X. Cai. 1446-1453 [doi]
- Evaluating Ubiquitous Sensor Information Sharing on the Internet-of-ThingsStefan Forsström, Patrik Österberg, Theo Kanter. 1454-1460 [doi]
- A Block-Based Still Image Coder for Parallel ComputingYu-Lin Wang, Chia-Te Liao, Alvin Wen-Yu Su. 1461-1468 [doi]
- The Load Balancing Problem in Extended OTIS-n-Cube Interconnection NetworksJehad Al-Sadi. 1469-1474 [doi]
- Performances of CS-DCSK UWB Communication System in the Presence of Narrow Band InterferersZhixiong Chen, Weikai Xu, Jin Huang, Lin Wang 0003. 1475-1480 [doi]
- Enhanced Multi-rate Multicast for Optimal User Satisfaction and Efficient Bandwidth UtilizationKhodor Hamandi, Farah Saab, Ayman I. Kayssi. 1481-1485 [doi]
- User Satisfaction Based ZFBF Scheduling Algorithm in Multi-user MIMO SystemHailang Cao, Ping Wang, Lei Chen, Fuqiang Liu, Xinhong Wang, Yin Zhu, Huifang Pang. 1486-1490 [doi]
- Discovering a Large Scale Internet Topology: Complementary and Contrast ViewHao Yin, Heungsun Chang, Fangming Liu, Tongyu Zhan, Ying Zhang, Bo Li 0001. 1491-1498 [doi]
- Interference Free Integration of Pervasive ApplicationsChristophe Soares, Rui S. Moreira, Ricardo Morla, José Torres, Pedro Sobral. 1499-1506 [doi]
- Including Metadata into an Ontology Based Pervasive Computing ArchitectureMartin Peters, Christopher Brink, Sabine Sachweh. 1507-1512 [doi]
- Chronological Accommodation of Oculo-motors in Response to Varying Sizes of Visual StimuliMinoru Nakayama, Masashi Fujimoto. 1513-1519 [doi]
- Ubiquitous Secure Interactions with Intelligent Artifacts on the Internet-of-ThingsStefan Forsström, Theo Kanter, Patrik Österberg. 1520-1524 [doi]
- Optimal Resource Allocation for Multi-layered Video Streaming over Multi-channel Cognitive Radio NetworksBo Guan, Yifeng He. 1525-1528 [doi]
- Distributed Rerouting for Multiple Sessions in Cognitive Radio NetworksYing Dai, Jie Wu 0001. 1529-1536 [doi]
- Formal Verification of a Key Agreement Protocol for Wireless Sensor NetworksYue Li, Dehua Chen, Thomas Newe. 1537-1542 [doi]
- Window Energy Detection for Unmanned Surveillance with PIR SensorSang Gi Hong, Young Bag Moon, Naesoo Kim, Whan-Woo Kim. 1543-1547 [doi]
- A Dynamic Bandwidth Allocation Algorithm for a Multi-sink Wireless Sensor Network Converged with a Passive Optical NetworkZhenfei Wang, Kun Yang, David K. Hunter. 1548-1554 [doi]
- Fast and Efficient Information Dissemination in Event-Based Wireless Sensor NetworksSain Saginbekov, Arshad Jhumka. 1555-1561 [doi]
- Data-centric Dissemination to Mobile Sink Group in Wireless Sensor NetworksHee-Sook Mo, Hyochan Bang, Cheol-Sig Pyo. 1562-1569 [doi]
- Link Stability Evaluation and Stability Based Multicast Routing Protocol in Mobile Ad Hoc NetworksZhiyong Zhang, Zhiping Jia, Hui Xia. 1570-1577 [doi]
- A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on HighwaysMahmoud Hashem Eiza, Qiang Ni. 1578-1585 [doi]
- Hyper-mutation Based Genetic Algorithms for Dynamic Multicast Routing Problem in Mobile Ad Hoc NetworksHui Cheng, Shengxiang Yang. 1586-1592 [doi]
- A Reception Based Node Selection Protocol for Multi-hop Routing in Vehicular Ad-hoc NetworksM. Bilal, M. O. Hussain, Pauline M. L. Chan. 1593-1600 [doi]
- Flow-Aware Broadcasting AlgorithmDiogo Lima, Hugo Miranda. 1601-1608 [doi]
- User Preferences-Adaptive Dynamic Network Selection Approach in Cooperating Wireless Networks: A Game Theoretic PerspectiveHaris Pervaiz, Qiang Ni. 1609-1616 [doi]
- Design and Analysis of Multicast-Based Publisher/Subscriber Models over Wireless Platforms for Smart Grid CommunicationsSina Fateri, Qiang Ni, Gareth A. Taylor, Sivanantharasa Panchadcharam, Ioana Pisica. 1617-1623 [doi]
- A HiperLAN/2 Based MAC Protocol for Efficient Vehicle-to-Infrastructure Communication Using Directional Wireless Mesh BackboneSandip Chakraborty, Sukumar Nandi. 1624-1631 [doi]
- Location Assisted Vertical Handover Algorithm for QoS Optimization in End-to-end ConnectionsMartin S. Dam, Steffen Christensen, Lars M. Mikkelsen, Rasmus L. Olesen. 1632-1640 [doi]
- Collision and Detection Performance with Three Overlap Signal Collisions in Space-Based AIS ReceptionMenghui Yang, Yongzhong Zou, Li Fang. 1641-1648 [doi]
- Error Performance Analysis of Opportunistic Relaying System Based on DCSKJin Huang, Zhexin Xu, Weikai Xu, Lin Wang 0003. 1649-1653 [doi]
- Modelling of Prioritised Vertical Handoff Scheme in Integrated UMTS/WLANsZaid Ahmed Said Zabanoot, Geyong Min. 1654-1660 [doi]
- Design and Evaluation of an Operational Mobility Model over IPv6 (OMIPv6) Based on ID/Locator Split ArchitectureYulei Wu, Jingguo Ge, Junling You, Yuepeng E.. 1661-1665 [doi]
- AR Teleport: Digital Reconstruction of Historical and Cultural-Heritage Sites Using Mobile Augmented RealityJiyoung Kang. 1666-1675 [doi]
- A Model Driven Infrastructure for Context-Awareness Mobile Assessment PersonalizationAhlem Harchay, Lilia Cheniti-Belcadhi, Rafik Braham. 1676-1683 [doi]
- Modeling an Enhanced Tuple Space Based Mobile Middleware in UNITYSuddhasil De, Sukumar Nandi, Diganta Goswami. 1684-1691 [doi]
- A Trajectory Model to Deal with Transmission FailuresFrancisco Javier Moreno Arboleda, Sebastian Munera, Luis Munoz. 1692-1697 [doi]
- Improving the Energy-Efficiency of GPS Based Location Sensing Smartphone ApplicationsThomas Olutoyin Oshin, Stefan Poslad, Athen Ma. 1698-1705 [doi]
- Efficient Internet Mapping in the Presence of Network Load BalancersMehiar Dabbagh, Naoum Sayegh, Ayman I. Kayssi. 1706-1713 [doi]
- The Impact of Sensor Node Distribution on Routing Protocols Performance: A Comparitive StudyUthman Baroudi, Anas Al-Roubaiey, Samir Mekid, Abdelhafid Bouhraoua. 1714-1720 [doi]
- A Temporalised Belief Logic for Reasoning about Authentication ProtocolsJi Ma, Klaus-Dieter Schewe. 1721-1728 [doi]
- Cross-Technology Overlay Control Protocol for Resource Management in Converged NetworksAndreas Bontozoglou, Kun Yang, Ken Guild. 1729-1734 [doi]
- Improving Query for P2P SIP VoIPLinchen Yu. 1735-1740 [doi]
- A Round Robin Load Balancing and Redundancy Protocol for Network RoutersSarah Abdallah, Elias Najjar, Ayman I. Kayssi. 1741-1747 [doi]
- Genetic Algorithm in Resource Provider Selection for Personal Live Content Delivery in User-Provided PlatformJoseph C. H. So, Po-Choi Wong. 1748-1754 [doi]
- On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for DisastersShinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka. 1755-1762 [doi]
- A Hybrid Ontological and Temporal Approach for Composite Activity ModellingGeorge Okeyo, Liming Chen, Hui Wang 0001, Roy Sterritt. 1763-1770 [doi]
- Categorising Context and Using Short Term Contextual Information to Obtain Long Term ContextAbhinav Duggal, Manoj Misra, Ramesh Srinivasaraghavan. 1771-1776 [doi]
- Semantic Decision Support Models for Energy Efficiency in Smart-Metered HomesYan Tang, Ioana Ciuciu. 1777-1784 [doi]
- Robot Navigation Using Brain-Computer InterfacesAthanasios Vourvopoulos, Fotis Liarokapis. 1785-1792 [doi]
- A Comprehensive Ontology for Knowledge Representation in the Internet of ThingsWei Wang 0042, Suparna De, Ralf Tönjes, Eike Steffen Reetz, Klaus Moessner. 1793-1798 [doi]
- Hybrid Ontology Matching for Solving the Heterogeneous Problem of the IoTZhichun Wang, Rongfang Bie, Mingquan Zhou. 1799-1804 [doi]
- Design of Real Time Multimedia Platform and Protocol to the Internet of ThingsWei Jiang, Limin Meng. 1805-1810 [doi]
- Knowledge Acquisition and Management Architecture for Mobile and Personal Health Environments Based on the Internet of ThingsAntonio J. Jara, Miguel A. Zamora, Antonio F. Gómez-Skarmeta. 1811-1818 [doi]
- Efficient Searching Mechanism for Trust-Aware Recommender Systems Based on Scale-Freeness of Trust NetworksWeiwei Yuan, Donghai Guan, Lei Shu, Jianwei Niu. 1819-1823 [doi]
- Square-Root Unscented Kalman Filtering Based Localization and Tracking in the Internet of ThingsJunqi Guo, Hongyang Zhang, Yunchuan Sun, Rongfang Bie. 1824-1829 [doi]
- A Text Representation Method Based on Harmonic SeriesXue Chen, Chao Wu. 1830-1834 [doi]
- Research on Embedding ECC into RFID Authentication ProtocolGuicheng Shen, Bingwu Liu. 1835-1838 [doi]
- A Hybrid MPI/OpenMP Model Based on DDM for Large-Scale Partial Differential EquationsDandan Li, Xiaohui Ji, ZhangBing Zhou, Qun Wang. 1839-1843 [doi]
- Real-Time Distributed Sensor-Assisted mHealth Applications on the Internet-of-ThingsStefan Forsström, Theo Kanter, Olle Johansson. 1844-1849 [doi]
- Quality Assessment of Video Transmission in Heterogeneous Networks as Applied to Real-Time TelecareColin Bailey, Xiao-Hong Peng. 1850-1855 [doi]
- Time- and Frequency-Domain Impulsive Noise Spreader for OFDM SystemsS. Nayyef, Charalampos Tsimenidis, Arafat J. Al-Dweik, Bayan S. Sharif, Ali Hazmi. 1856-1861 [doi]
- DSDV, DYMO, OLSR: Link Duration and Path StabilityS. Kumar, Nadeem Javaid, Z. Yousuf, H. Kumar, Zahoor Ali Khan, Ayesha Bibi. 1862-1866 [doi]
- Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETsS. Sagar, Nadeem Javaid, Zahoor Ali Khan, J. Saqib, Ayesha Bibi, Safdar Hussain Bouk. 1867-1871 [doi]
- Role Based Privacy-Aware Secure Routing in WMNsHui Lin, Jia Hu, Atulya Nagar, Li Xu. 1872-1877 [doi]
- An Ant Colony Optimization Algorithm for Overlay Backbone Multicast Routing in Content Delivery NetworksGang Liu, Hua Wang, Hong Zhang. 1878-1882 [doi]
- The Research and Application of a Specific Instruction Processor for SMS4Zhenzhou Li, Feng Li, Zhiping Jia, Lei Ju, Renhai Chen. 1883-1888 [doi]
- Prediction-Based Algorithm for Event Detection in Wireless Sensor NetworksYongji Yu, Zhiping Jia, Ruihua Zhang. 1889-1894 [doi]
- Testing Method of Code Redundancy Simplification Based on Program Dependency GraphYang Fan, Zhang Huanguo, Yan-Fei, Yang Jian. 1895-1900 [doi]
- Dynamic Optimization on Multi-core PlatformJiahui Wen, Li Shen, Zhiying Wang. 1901-1906 [doi]
- A Dynamic Cache Partitioning Mechanism under Virtualization EnvironmentXiaolin Wang, Xiang Wen, Yechen Li, Yingwei Luo, Xiaoming Li, Zhenlin Wang. 1907-1911 [doi]
- HVD-TLS: A Novel Framework of Thread Level SpeculationFan Xu, Shen Li, Zhiying Wang. 1912-1917 [doi]
- An Efficient Distributed Transactional Memory SystemXin Peng, Xiaofei Liao, Hai Jin, Xuepeng Fan, Xuping Tu, Linchen Yu. 1918-1923 [doi]
- Causal Analysis of Student's Characteristics of Note-Taking Activities and Learning Performance during a Fully Online CourseMinoru Nakayama, Kouichi Mutsuura, Hiroh Yamamoto. 1924-1929 [doi]
- Research on Cooperative Learning of Digital English Writing in Network EnvironmentXiaodong Li, Hong Zhang. 1930-1935 [doi]
- Development and Validation of a Virtual Worklog as a Collaboration Tool for the Kelluwen Learning CommunityKatherine Inalef, Julio Guerra, Eliana Scheihing. 1936-1941 [doi]
- Actualization of a Course Library through Influential Twitter KnowledgeMalinka Ivanova, Tatyana Ivanova. 1942-1947 [doi]
- The Current State of Understanding of the Energy Efficiency of Cloud ComputingFrancis Owusu, Colin Pattinson. 1948-1953 [doi]
- Enabling the IoT Paradigm in E-health Solutions through the VIRTUS MiddlewareMarco Bazzani, Davide Conzon, Andrea Scalera, Maurizio A. Spirito, Claudia Irene Trainito. 1954-1959 [doi]
- Ubiquitous HealthCare in Wireless Body Area NetworksN. A. Khan, Nadeem Javaid, Zahoor Ali Khan, M. Jaffar, U. Rafiq, Ayesha Bibi. 1960-1967 [doi]
- Performance Study of Localization Techniques in Wireless Body Area Sensor NetworksObaid Ur Rehman, Nadeem Javaid, Ayesha Bibi, Zahoor Ali Khan. 1968-1975 [doi]
- Radio Frequency Energy Harvesting Characterization: An Experimental StudyUthman Baroudi, Amin-ud-din Qureshi, Samir Mekid, Abdelhafid Bouhraoua. 1976-1981 [doi]
- A Novel System for Evaluating Website Using Link AnalysisXiaoqiang Li, Yun Mi, Yingwei Jin, Heng Qi, Zhiyang Li. 1982-1987 [doi]
- An Efficient Detecting Communities Algorithm with Self-Adapted Fuzzy C-Means Clustering in Complex NetworksJianzhi Jin, Yuhua Liu, Laurence Tianruo Yang, Naixue Xiong, Fang Hu. 1988-1993 [doi]
- An Analysis of Peer to Peer Protocols for Massively Multiplayer Online GamesAndrew Jones, Lu Liu, Nick Antonopoulos, Weining Liu. 1994-1999 [doi]
- Padati: A Robust Pedestrian Dead Reckoning System on SmartphonesDeepak Pai, Inguva Sasi, Phani Shekhar Mantripragada, Mudit Malpani, Nitin Aggarwal. 2000-2007 [doi]
- High Accuracy 3D Indoor Positioning Using Broadband Ultrasonic SignalsSérgio Ivan Lopes, José Manuel Neto Vieira, Daniel F. Albuquerque. 2008-2014 [doi]
- Weighted Flow and Spectral Resource to Enhance QoS for Multi-hop Cognitive Radio NetworksYean-Fu Wen. 2015-2020 [doi]
- An Integrated Mobile System for Long-Term Aerobic Activity Monitoring and Support in Daily LifeAttila Reiss, Didier Stricker, Ilias Lamprinos. 2021-2028 [doi]
- Foundations for a Platform to Develop Context-aware Systems by Domain ExpertsDavid Martin, Carlos Lamsfus, Aurkene Alzua, Diego López-de-Ipiña. 2029-2034 [doi]
- Joint Source-Channel Coding Based on P-LDPC Codes for Radiography Images TransmissionHuihui Wu, He Jiguang, Liangliang Xu, Lin Wang 0003. 2035-2039 [doi]