| 499 | -- | 501 | Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Mostafa Fouda, Hae Young Lee. Defending against wireless network intrusion |
| 502 | -- | 519 | Alif Wahid, Christopher Leckie, Chenfeng Vincent Zhou. Estimating the number of hosts corresponding to an intrusion alert while preserving privacy |
| 520 | -- | 532 | Yifan Zhao, Swee-Won Lo, Robert H. Deng, Xuhua Ding. Technique for authenticating H.264/SVC and its performance evaluation over wireless mobile networks |
| 533 | -- | 545 | Yang Yang. Broadcast encryption based non-interactive key distribution in MANETs |
| 546 | -- | 553 | Zhiwei Wang, Guozi Sun, Danwei Chen. A new definition of homomorphic signature for identity management in mobile cloud computing |
| 554 | -- | 570 | Paulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin. Algorithms for a distributed IDS in MANETs |
| 571 | -- | 590 | Manuel Gil Pérez, Félix Gómez Mármol, Gregorio Martínez Pérez, Antonio F. Gómez-Skarmeta. Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems |
| 591 | -- | 601 | Saeed-ur Rehman, Kevin W. Sowerby, Colin Coghill. Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers |
| 602 | -- | 617 | Guangjie Han, Jinfang Jiang, Lei Shu, Jianwei Niu, Han-Chieh Chao. Management and applications of trust in Wireless Sensor Networks: A survey |
| 618 | -- | 643 | Thanassis Giannetsos, Tassos Dimitriou. LDAC: A localized and decentralized algorithm for efficiently countering wormholes in mobile wireless networks |
| 644 | -- | 653 | Hosein Shafiei, Ahmad Khonsari, H. Derakhshi, P. Mousavi. Detection and mitigation of sinkhole attacks in wireless sensor networks |
| 654 | -- | 669 | Mauro Conti, Roberto Di Pietro, Angelo Spognardi. Clone wars: Distributed detection of clone attacks in mobile WSNs |
| 670 | -- | 685 | Leonardo Maccari, Renato Lo Cigno. Betweenness estimation in OLSR-based multi-hop networks for distributed filtering |