321 | -- | 336 | Gang Xu, Cristian Borcea, Liviu Iftode. A Policy Enforcing Mechanism for Trusted Ad Hoc Networks |
337 | -- | 352 | Jianneng Cao, Barbara Carminati, Elena Ferrari, Kian-Lee Tan. CASTLE: Continuously Anonymizing Data Streams |
353 | -- | 362 | Chia-Wei Lee, Sun-Yuan Hsieh. Determining the Diagnosability of (1, 2)-Matching Composition Networks and Its Applications |
363 | -- | 376 | Kealan McCusker, Noel E. O Connor. Low-Energy Symmetric Key Distribution in Wireless Sensor Networks |
377 | -- | 390 | Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao. Modeling and Detection of Camouflaging Worm |
391 | -- | 403 | Refik Samet. Recovery Device for Real-Time Dual-Redundant Computer Systems |
404 | -- | 418 | K. K. Rao, James Lee Hafner, Richard A. Golding. Reliability for Networked Storage Nodes |
419 | -- | 433 | Cyrus Harvesf, Douglas M. Blough. Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables |
434 | -- | 449 | Xinyuan Wang, Douglas S. Reeves. Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking |
450 | -- | 465 | Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia. Securing Topology Maintenance Protocols for Sensor Networks |
466 | -- | 480 | Erik-Oliver Blass, Anil Kurmus, Refik Molva, Guevara Noubir, Abdullatif Shikfa. The F_f-Family of Protocols for RFID-Privacy and Authentication |