245 | -- | 251 | Marco Bucci, Luca Giancane, Raimondo Luzzi, Alessandro Trifiletti. A Dynamic and Differential CMOS Lookup Table with Data-Independent Power Consumption for Cryptographic Applications on Chip Cards |
252 | -- | 265 | Xiaoxin Wu, Elisa Bertino. An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks |
266 | -- | 279 | Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia, Paulo Veríssimo. Automated Rule-Based Diagnosis through a Distributed Monitor System |
280 | -- | 294 | Ilir Gashi, Peter T. Popov, Lorenzo Strigini. Fault Tolerance via Diversity for Off-the-Shelf Products: A Study with SQL Database Servers |
295 | -- | 312 | Marco Serafini, Andrea Bondavalli, Neeraj Suri. Online Diagnosis and Recovery: On the Choice and Impact of Tuning Parameters |
313 | -- | 324 | Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarathnam Chandramouli, K. P. Subbalakshmi. Opportunistic Encryption: A Trade-Off between Security and Throughput in Wireless Networks |
325 | -- | 336 | Jeremy Lee, Mohammad Tehranipoor, Chintan Patel, Jim Plusquellic. Securing Designs against Scan-Based Side-Channel Attacks |
337 | -- | 340 | Hung-Yu Chien. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity |