| 223 | -- | 225 | Jong Hyuk Park, Sheikh Iqbal Ahamed, Willy Susilo, Michela Taufer. Special issue of computer communications on information and future communication security |
| 226 | -- | 235 | Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park. DoS attacks exploiting signaling in UMTS and IMS |
| 236 | -- | 240 | Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao. An RFID secure authentication mechanism in WLAN |
| 241 | -- | 249 | Yufeng Wang, Akihiro Nakao, Athanasios V. Vasilakos, Jianhua Ma. P2P soft security: On evolutionary dynamics of P2P incentive mechanism |
| 250 | -- | 256 | Yu-Yi Chen, Meng-Lin Tsai, Jinn-ke Jan. The design of RFID access control protocol using the strategy of indefinite-index and challenge-response |
| 257 | -- | 263 | Ying Sun, Chunxiang Xu, Yong Yu, Bo Yang. Improvement of a proxy multi-signature scheme without random oracles |
| 264 | -- | 273 | Qixu Liu, Yuqing Zhang. VRSS: A new system for rating and scoring vulnerabilities |
| 274 | -- | 280 | Ren-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei. Robust authentication and key agreement scheme preserving the privacy of secret key |
| 281 | -- | 294 | Sudip Misra, Ankur Vaish. Reputation-based role assignment for role-based access control in wireless sensor networks |
| 295 | -- | 304 | Jong Sik Moon, Im-Yeong Lee. An AAA scheme using ID-based ticket with anonymity in future mobile communication |
| 305 | -- | 309 | Muhammad Khurram Khan, Soo-Kyun Kim, Khaled Alghathbar. Cryptanalysis and security enhancement of a more efficient & secure dynamic ID-based remote user authentication scheme |
| 310 | -- | 318 | Bo-Chao Cheng, Ryh-Yuh Tseng. A Context Adaptive Intrusion Detection System for MANET |
| 319 | -- | 325 | Jing Xu, Wen Tao Zhu, Dengguo Feng. An efficient mutual authentication and key agreement protocol preserving user anonymity in mobile networks |
| 326 | -- | 336 | Binod Vaidya, Jong Hyuk Park, Sang-Soo Yeo, Joel J. P. C. Rodrigues. Robust one-time password authentication scheme using smart card for home network environment |
| 337 | -- | 341 | Tzu-Chang Yeh, Chien-Hung Wu, Yuh-Min Tseng. Improvement of the RFID authentication scheme based on quadratic residues |
| 342 | -- | 343 | The Anh Pham. The improvement of the knapsack cipher |
| 344 | -- | 352 | Zhengping Jin, Qiaoyan Wen. Certificateless multi-proxy signature |
| 353 | -- | 357 | Taek-Young Youn, Changhoon Lee, Young-Ho Park. An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes |
| 358 | -- | 366 | Jia Zhang, Hai-Xin Duan, Wu Liu, Jianping Wu. Anonymity analysis of P2P anonymous communication systems |
| 367 | -- | 374 | Daojing He, Maode Ma, Yan Zhang, Chun Chen, Jiajun Bu. A strong user authentication scheme with smart cards for wireless communications |
| 375 | -- | 383 | Jian Wang, Yanheng Liu, Yu Jiao. Novel access and remediation scheme in hierarchical trusted network |
| 384 | -- | 390 | Dang Nguyen Duc, Kwangjo Kim. Defending RFID authentication protocols against DoS attacks |
| 391 | -- | 397 | Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value |
| 398 | -- | 406 | Mieso K. Denko, Tao Sun, Isaac Woungang. Trust management in ubiquitous computing: A Bayesian approach |
| 407 | -- | 422 | Dwaine E. Clarke. Design and implementation of a public key-based group collaboration system |
| 423 | -- | 428 | Longjiang Li, Yuming Mao, Supeng Leng. Privacy addressing and autoconfiguration for mobile ad hoc networks |
| 429 | -- | 435 | Liang Zhou, Athanasios V. Vasilakos, Naixue Xiong, Yan Zhang, Shiguo Lian. Scheduling security-critical multimedia applications in heterogeneous networks |
| 436 | -- | 446 | Qi Zhang, Yi Mu, Minjie Zhang. Attribute-based authentication for multi-agent systems with dynamic groups |
| 447 | -- | 456 | Lo-Yao Yeh, Yen-Cheng Chen, Jiun-Long Huang. PAACP: A portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks |
| 457 | -- | 467 | Lars Völker, Marcel Noe, Oliver P. Waldhorst, Christoph Werle, Christoph Sorge. Can internet users protect themselves? Challenges and techniques of automated protection of HTTP communication |
| 468 | -- | 484 | Zubair A. Baig. Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks |
| 485 | -- | 493 | Leonardo B. Oliveira, Diego F. Aranha, Conrado Porto Lopes Gouvêa, Michael Scott, Danilo F. Cåmara, Julio López, Ricardo Dahab. TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks |
| 494 | -- | 501 | Zhenhua Liu, Yupu Hu, Xiangsong Zhang, Hua Ma. Provably secure multi-proxy signature scheme with revocation in the standard model |
| 502 | -- | 514 | Wei Lu, Goaletsa Rammidi, Ali A. Ghorbani. Clustering botnet communication traffic based on n-gram feature selection |
| 515 | -- | 523 | Roberto Di Pietro, Alexandre Viejo. Location privacy and resilience in wireless sensor networks querying |