188 | -- | 201 | Habib F. Rashvand, Khaled Salah, Jose M. Alcaraz Calero, Lein Harn. Distributed security for multi-agent systems - review and applications |
202 | -- | 211 | Mehrdad Nojoumian, Douglas R. Stinson, Morgan Grainger. Unconditionally secure social secret sharing scheme |
212 | -- | 232 | Xin Li, Zhiping Jia, Peng Zhang, Ruihua Zhang, Haiyang Wang. Trust-based on-demand multipath routing in mobile ad hoc networks |
233 | -- | 247 | Stephen Bishop, Hamed Okhravi, Shahram Rahimi, Yung-Chuan Lee. Covert channel resistant information leakage protection using a multi-agent architecture |
248 | -- | 257 | Chih-Ta Yen, Tzong-Chen Wu, Ming-Huang Guo, Chuan-Kai Yang, Han-Chieh Chao. Digital product transaction mechanism for electronic auction environment |
258 | -- | 272 | Pitipatana Sakarindr, Nirwan Ansari. Survey of security services on group communications |
273 | -- | 282 | Christian Damsgaard Jensen. Supporting multi-agent reputation calculation in the Wikipedia Recommender System |
283 | -- | 300 | Padmalochan Bera, Santosh K. Ghosh, Pallab Dasgupta. Integrated security analysis framework for an enterprise network - a formal approach |
301 | -- | 321 | Morteza Amini, Rasool Jalili. Multi-level authorisation model and framework for distributed semantic-aware environments |
322 | -- | 332 | Santosh Chandrasekhar, Saikat Chakrabarti 0002, Mukesh Singhal, Kenneth L. Calvert. Efficient proxy signatures based on trapdoor hash functions |
333 | -- | 343 | Zubair A. Baig, Khaled Salah. Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks |
344 | -- | 351 | Meng Yu, Wanyu Zang, Peng Liu. Recovery of data integrity under multi-tier architectures |
352 | -- | 360 | Ming-Huang Guo, Horng-Twu Liaw, Der-Jiunn Deng, Han-Chieh Chao. Cluster-based secure communication mechanism in wireless ad hoc networks |
361 | -- | 373 | Yi-Ying Zhang, Han-Chieh Chao, Min Chen, Lei Shu, Chulhyun Park, Myong-Soon Park. Outlier detection and countermeasure for hierarchical wireless sensor networks |
374 | -- | 389 | Sudip Misra, P. Venkata Krishna, Kiran Isaac Abraham. Adaptive link-state routing and intrusion detection in wireless mesh networks |
390 | -- | 396 | Hong Wen, Pin-Han Ho, Qi Chai, Guang Gong. Physical layer assisted authentication for distributed ad hoc wireless sensor networks |
397 | -- | 410 | Fatemeh Raji, Behrouz Tork Ladani. Anonymity and security for autonomous mobile agents |
411 | -- | 421 | Jose M. Alcaraz Calero, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. Towards an authorisation model for distributed systems based on the Semantic Web |