77 | -- | 86 | Edith C. H. Ngai. On providing sink anonymity for wireless sensor networks |
87 | -- | 93 | Geoffrey Ottoy, Tom Hamelinckx, Bart Preneel, Lieven De Strycker, Jean-Pierre Goemaere. On the choice of the appropriate AES data encryption method for ZigBee nodes |
94 | -- | 105 | Emmanouil Magkos, Panayiotis Kotzanikolaou. SCN-SI-021 achieving privacy and access control in pervasive computing environments |
106 | -- | 117 | Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens. Symmetric key infrastructure for authenticated key establishment between resource constrained nodes and powerful devices |
118 | -- | 129 | Krzysztof Szczypiorski, Wojciech Mazurczyk. Steganography in IEEE 802.11 OFDM symbols |
130 | -- | 138 | Martin Werner. Privacy-protected communication for location-based services |
139 | -- | 148 | Chin-Feng Lee, Chi-Yao Weng, Aneesh Sharma. Steganographic access control in data hiding using run-length encoding and modulo-operations |
149 | -- | 165 | Christophe Huygens, Nelson Matthys, Wouter Joosen. Optimizing resource and data security in shared sensor networks |
166 | -- | 170 | Zhiwei Wang. et al |
171 | -- | 183 | Binod Vaidya, Dimitrios Makrakis, Hussein Mouftah. Two-factor mutual authentication with key agreement in wireless sensor networks |