Journal: J. Internet Serv. Inf. Secur.

Volume 2, Issue 1/2

1 -- 21Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí, Josep Prieto-Blázquez. Towards secure mobile P2P applications using JXME
22 -- 48Karl Andersson. Interworking Techniques and Architectures for Heterogeneous Wireless Networks
49 -- 58Jianfeng Wang, Xiaofeng Chen 0001, Hua Ma, Qiang Tang 0001, Jin Li 0002, Hui Zhu. A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data
59 -- 72Charles J. Zinsmeyer, Turgay Korkmaz. A Comparative Review of Connectivity-Based Wireless Sensor Localization Techniques
73 -- 92Manuel Mazzara, Nicola Dragoni, Mu Zhou. Implementing Workflow Reconfiguration in WS-BPEL
93 -- 104Atsuko Miyaji, Mohammad Shahriar Rahman. Private Two-Party Set Intersection Protocol in Rational Model
105 -- 118João Carneiro, João Laranjeira, Goreti Marreiros, Carlos Filipe Freitas, Ricardo Santos. A Context-aware Model to Support Ubiquitous Group Decision Making
119 -- 131Sang Min Lee, Dong Seong Kim, Jong Sou Park. A Survey and Taxonomy of Lightweight Intrusion Detection Systems