1 | -- | 21 | Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí, Josep Prieto-Blázquez. Towards secure mobile P2P applications using JXME |
22 | -- | 48 | Karl Andersson. Interworking Techniques and Architectures for Heterogeneous Wireless Networks |
49 | -- | 58 | Jianfeng Wang, Xiaofeng Chen 0001, Hua Ma, Qiang Tang 0001, Jin Li 0002, Hui Zhu. A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data |
59 | -- | 72 | Charles J. Zinsmeyer, Turgay Korkmaz. A Comparative Review of Connectivity-Based Wireless Sensor Localization Techniques |
73 | -- | 92 | Manuel Mazzara, Nicola Dragoni, Mu Zhou. Implementing Workflow Reconfiguration in WS-BPEL |
93 | -- | 104 | Atsuko Miyaji, Mohammad Shahriar Rahman. Private Two-Party Set Intersection Protocol in Rational Model |
105 | -- | 118 | João Carneiro, João Laranjeira, Goreti Marreiros, Carlos Filipe Freitas, Ricardo Santos. A Context-aware Model to Support Ubiquitous Group Decision Making |
119 | -- | 131 | Sang Min Lee, Dong Seong Kim, Jong Sou Park. A Survey and Taxonomy of Lightweight Intrusion Detection Systems |