3 | -- | 10 | Ruidong Li, Jie Li, Hsiao-Hwa Chen. DKMS: distributed hierarchical access control for multimedia networks |
11 | -- | 26 | Pitipatana Sakarindr, Nirwan Ansari. Adaptive trust-based anonymous network |
27 | -- | 36 | Robert A. Malaney. Securing Wi-Fi networks with position verification: extended version |
37 | -- | 49 | Fangting Sun, Mark A. Shayman. On pairwise connectivity of wireless multihop networks |
50 | -- | 59 | Ozgun Erdogan, Pei Cao. Hash-AV: fast virus signature scanning by cache-resident filters |
60 | -- | 70 | Paul Rabinovich, Robert Simon. Secure message delivery in publish/subscribe networks using overlay multicast |
71 | -- | 80 | Zesheng Chen, Chuanyi Ji. Optimal worm-scanning method using vulnerable-host distributions |
81 | -- | 94 | Jianping Pan, Lin Cai, Xuemin Shen. Vulnerabilities in distance-indexed IP traceback schemes |
95 | -- | 108 | Turgay Korkmaz, Chao Gong, Kamil Saraç, Sandra G. Dykes. Single packet IP traceback in AS-level partial deployment scenario |
109 | -- | 121 | Hui Ling, Taieb Znati. End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks |
122 | -- | 136 | N. Sertac Artan, H. Jonathan Chao. Design and analysis of a multipacket signature detection system |
137 | -- | 153 | Ye Zhu, Xinwen Fu, Riccardo Bettati, Wei Zhao. Analysis of flow-correlation attacks in anonymity network |
154 | -- | 169 | Qijun Gu, Peng Liu, Chao-Hsien Chu, Sencun Zhu. Defence against packet injection in ad hoc networks |