503 | -- | 504 | Fairouz Kamareddine. Capsule Reviews |
505 | -- | 512 | Zuowen Tan. An Off-line Electronic Cash Scheme Based on Proxy Blind Signature |
513 | -- | 524 | Fuchun Guo, Yi Mu, Willy Susilo. Short Signatures with a Tighter Security Reduction Without Random Oracles |
525 | -- | 536 | Qiong Huang, Duncan S. Wong, Guomin Yang. Heterogeneous Signcryption with Key Privacy |
537 | -- | 548 | Mehran S. Fallah, Maryam Mouzarani. A Game-based Sybil-resistant Strategy for Reputation Systems in Self-organizing MANETs |
549 | -- | 569 | Biming Tian, Song Han, Sazia Parvin, Jiankun Hu, Sajal K. Das. Self-Healing Key Distribution Schemes for Wireless Networks: A Survey |
570 | -- | 588 | Prasanta Gogoi, D. K. Bhattacharyya, Bhogeswar Borah, Jugal K. Kalita. A Survey of Outlier Detection Methods in Network Anomaly Identification |
589 | -- | 601 | Ender YĆ¼ksel, Hanne Riis Nielson, Flemming Nielson. A Secure Key Establishment Protocol for ZigBee Wireless Sensor Networks |
602 | -- | 616 | Murat Ergun, Albert Levi, Erkay Savas. Increasing Resiliency in Multi-phase Wireless Sensor Networks: Generationwise Key Predistribution Approach |
617 | -- | 627 | David Taniar, Maytham Safar, Quoc Thai Tran, J. Wenny Rahayu, Jong Hyuk Park. Spatial Network RNN Queries in GIS |
628 | -- | 638 | Chien-Lung Chan. Information Security Risk Modeling Using Bayesian Index |