379 | -- | 381 | Fairouz Kamareddine. Capsule Reviews |
382 | -- | 383 | Jiankun Hu, Yang Xiang, Wanlei Zhou. Advances in Network and System Security: Editorial Statement |
384 | -- | 396 | Leonardo B. Oliveira, Aman Kansal, Conrado Porto Lopes Gouvêa, Diego F. Aranha, Julio López, Bodhi Priyantha, Michel Goraczko, Feng Zhao. Secure-TWS: Authenticating Node to Multi-user Communication in Shared Sensor Networks |
397 | -- | 409 | Udaya Kiran Tupakula, Vijay Varadharajan. Dynamic State-Based Security Architecture for Detecting Security Attacks in Virtual Machines |
410 | -- | 421 | Shui Yu, Wanlei Zhou, Weijia Jia, Jiankun Hu. Attacking Anonymous Web Browsing at Local Area Networks Through Browsing Dynamics |
422 | -- | 437 | Xiaoxun Sun, Hua Wang, Jiuyong Li, Yanchun Zhang. Satisfying Privacy Requirements Before Data Anonymization |
438 | -- | 0 | Biming Tian, Song Han, Sazia Parvin, Jiankun Hu, Sajal K. Das. Erratum: Self-Healing Key Distribution Schemes for Wireless Networks: A Survey |
439 | -- | 446 | Hung-Yu Chien. Improved Anonymous Multi-receiver Identity-Based Encryption |
447 | -- | 456 | Xiangyang Luo, Fenlin Liu, Chunfang Yang, Shiguo Lian, Daoshun Wang. On F5 Steganography in Images |
457 | -- | 474 | Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu. Certificateless Signatures: New Schemes and Security Models |
475 | -- | 486 | Yuh-Min Tseng, Tung-Tso Tsai. Efficient Revocable ID-Based Encryption with a Public Channel |
487 | -- | 496 | Li-na Zhu, Li Feng, Zuochang Zhang. Predicting the Propagation Path of Random Worm by Subnet Infection Situation Using Fuzzy Reasoning |
497 | -- | 507 | Lanfranco Lopriore. Encrypted Pointers in Protection System Design |