801 | -- | 802 | Andrew L. Kun, Albrecht Schmidt, Anind K. Dey, Susanne Boll. Automotive user interfaces and interactive applications in the car |
803 | -- | 813 | Florian Schaub, Markus Hipp, Frank Kargl, Michael Weber 0001. On credibility improvements for automotive navigation systems |
815 | -- | 823 | Tuomo Kujala. Browsing the information highway while driving: three in-vehicle touch screen scrolling methods and driver distraction |
825 | -- | 834 | Andrew L. Kun, Alexander Shyrokov, Peter A. Heeman. Interactions between human-human multi-threaded dialogues and driving |
835 | -- | 836 | Jongsung Kim, Jiqiang Lu, Ching-Hsien Hsu. Advanced security technologies and applications for ubiquitous computing |
837 | -- | 841 | Zhiwei Wang, Wei Chen. An ID-based online/offline signature scheme without random oracles for wireless sensor networks |
843 | -- | 850 | Ching-Nung Yang, Pin-Wei Chen, Hsiang-Wen Shih, Cheonshik Kim. Aspect ratio invariant visual cryptography by image filtering and resizing |
851 | -- | 864 | Guangquan Xu, Weisheng Li, Rui Xu, Yingyuan Xiao, Honghao Gao, Xiaohong Li, Zhiyong Feng, Jia Mei. An algorithm on fairness verification of mobile sink routing in wireless sensor network |
865 | -- | 874 | Hung-Min Sun, Chiung-Hsun Chen, Chih-Wen Yeh, Yao-Hsin Chen. A collaborative routing protocol against routing disruptions in MANETs |
875 | -- | 882 | Zombo Fu, Yuan Cao, Jianxin Wang, Lin Yang. Reference-based importance assessment model of identity information |
883 | -- | 893 | Lin Yao, Lin Kang, Pengfei Shang, Guowei Wu. Protecting the sink location privacy in wireless sensor networks |
895 | -- | 905 | Da-Zhi Sun, Jian-Xin Li, Zhiyong Feng, Zhen-Fu Cao, Guangquan Xu. On the security and improvement of a two-factor user authentication scheme in wireless sensor networks |
907 | -- | 919 | Ashfaq Hussain Farooqi, Farrukh Aslam Khan, Jin Wang, Sungyoung Lee. A novel intrusion detection framework for wireless sensor networks |
921 | -- | 932 | Mooseop Kim, Deok-Gyu Lee, Jaecheol Ryou. Compact and unified hardware architecture for SHA-1 and SHA-256 of trusted mobile computing |
933 | -- | 943 | Sukin Kang, Jonguk Kim, Manpyo Hong. Go anywhere: user-verifiable authentication over distance-free channel for mobile devices |
945 | -- | 949 | Kyusuk Han, Jangseong Kim, Taeshik Shon, Daesik Ko. A novel secure key paring protocol for RF4CE ubiquitous smart home systems |
951 | -- | 963 | Dexi Liu, Changxuan Wan, Naixue Xiong, Jong Hyuk Park, Seungmin Rho. Top-k entities query processing on uncertainly fused multi-sensory data |
965 | -- | 969 | Se-Hak Chun. The burden of proof and the optimal security investment of firms in ubiquitous computing |
971 | -- | 972 | Elhadi Shakshuki, Muhammad Younas. New developments in pervasive and ambient information systems |
973 | -- | 985 | Thao P. Nghiem, Agustinus Borgy Waluyo, David Taniar. A pure peer-to-peer approach for kNN query processing in mobile ad hoc networks |
987 | -- | 998 | Vivek Menon, Bharat Jayaraman, Venu Govindaraju. Enhancing biometric recognition with spatio-temporal reasoning in smart environments |
999 | -- | 1011 | Mohd Izani Mohamed Rawi, Adnan Al-Anbuky. Wireless sensor networks and human comfort index |
1013 | -- | 1023 | Anas El Husseini, Abdallah M'hamed, Bachar El Hassan, Mounir Mokhtari. Trust-based authentication scheme with user rating for low-resource devices in smart environments |
1025 | -- | 1034 | Fadi M. Al-Turjman, Hossam S. Hassanein, Sharief M. A. Oteafy, Waleed Alsalih. Towards augmenting federated wireless sensor networks in forestry applications |
1035 | -- | 1050 | Mayu Iwata, Hiroki Miyamoto, Takahiro Hara, Daijiro Komaki, Kentaro Shimatani, Tomohiro Mashita, Kiyoshi Kiyokawa, Toshiaki Uemukai, Gen Hattori, Shojiro Nishio, Haruo Takemura. A content search system considering the activity and context of a mobile user |
1051 | -- | 1059 | Abidalrahman Moh'd, Nauman Aslam, William J. Phillips, William Robertson, Hosein Marzi. SN-SEC: a secure wireless sensor platform with hardware cryptographic primitives |