| 4232 | -- | 4233 | Jong Hyuk Park, Hsiao-Hwa Chen, Antonio Coronato, Gerd Kortuem. Secure multi-mode systems and their applications for pervasive computing |
| 4234 | -- | 4241 | Marie-Luce Bourguet. Handling uncertainty in multimodal pervasive computing applications |
| 4242 | -- | 4247 | Antonio Coronato, Giuseppe De Pietro. Middleware mechanisms for supporting multimodal interactions in smart environments |
| 4248 | -- | 4254 | Soo-Young Kang, Deok-Gyu Lee, Im-Yeong Lee. A study on secure RFID mutual authentication scheme in pervasive computing environment |
| 4255 | -- | 4258 | Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu. Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments |
| 4259 | -- | 4268 | Chi-Yuan Chen, Tin Yu Wu, Yueh-Min Huang, Han-Chieh Chao. An efficient end-to-end security mechanism for IP multimedia subsystem |
| 4269 | -- | 4280 | Rabia Riaz, Ayesha Naureen, Attiya Akram, Ali Hammad Akbar, Ki-Hyung Kim, H. Farooq Ahmed. A unified security framework with three key management schemes for wireless sensor networks |
| 4281 | -- | 4293 | Sheikh Iqbal Ahamed, Moushumi Sharmin. A trust-based secure service discovery (TSSD) model for pervasive computing |
| 4294 | -- | 4303 | Bo Sun, Yang Xiao, Chung-Chih Li, Hsiao-Hwa Chen, T. Andrew Yang. Security co-existence of wireless sensor networks and RFID for pervasive computing |
| 4304 | -- | 4311 | Chih-Hsiung Tseng, Sheng-Tzong Cheng. Location management scheme with WLAN positioning algorithm for integrated wireless networks |
| 4312 | -- | 4323 | Valentina Casola, Emilio Pasquale Mancini, Nicola Mazzocca, Massimiliano Rak, Umberto Villano. Self-optimization of secure web services |
| 4324 | -- | 4332 | Guorui Li, Jingsha He, Yingfang Fu. Group-based intrusion detection system in wireless sensor networks |
| 4333 | -- | 4342 | Markos P. Anastasopoulos, A. C. Voulkidis, Athanasios V. Vasilakos, Panayotis G. Cottis. A secure network management protocol for SmartGrid BPL networks: Design, implementation and experimental results |
| 4343 | -- | 4351 | Azzedine Boukerche, Yonglin Ren. A trust-based security system for ubiquitous and pervasive computing environments |
| 4352 | -- | 4359 | Bo-Chao Cheng, Huan Chen, Yi-Jean Li, Ryh-Yuh Tseng. A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks |
| 4360 | -- | 4366 | Xuefeng Liang, Naixue Xiong, Laurence Tianruo Yang, Hui Zhang, Jong Hyuk Park. A compensation scheme of fingerprint distortion using combined radial basis function model for ubiquitous services |
| 4367 | -- | 4375 | Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih Li. Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing |
| 4376 | -- | 4382 | Zhiyong Yu, Xingshe Zhou, Zhiwen Yu, Jong Hyuk Park, Jianhua Ma. iMuseum: A scalable context-aware intelligent museum system |