1297 | -- | 1309 | Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino. Anonymous Geo-Forwarding in MANETs through Location Cloaking |
1310 | -- | 1324 | Chao Gong, Kamil Saraç. A More Practical Approach for Single-Packet IP Traceback using Packet Logging and Marking |
1325 | -- | 1337 | Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jin-Peng Huai, Lionel M. Ni, Jian Ma. Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps |
1338 | -- | 1351 | Mohamed Shehab, Arif Ghafoor, Elisa Bertino. Secure Collaboration in a Mediator-Free Distributed Environment |
1352 | -- | 1366 | Mudhakar Srivatsa, Nithya Rajamani, Murthy V. Devarakonda. A Policy Evaluation Tool for Multisite Resource Management |
1367 | -- | 1380 | Idit Keidar, Alexander Shraer. How to Choose a Timing Model |
1381 | -- | 1395 | Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Petrini. Efficient Breadth-First Search on the Cell/BE Processor |
1396 | -- | 1410 | Matthew Curtis-Maury, Filip Blagojevic, Christos D. Antonopoulos, Dimitrios S. Nikolopoulos. Prediction-Based Power-Performance Adaptation of Multithreaded Scientific Codes |
1411 | -- | 1425 | Zhen Yu, Yong Guan. A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks |
1426 | -- | 1438 | Yu Wang, Xiang-Yang Li, Qian Zhang. Efficient Algorithms for p-Self-Protection Problem in Static Wireless Sensor Networks |