11 | -- | 22 | Nicolas Bernard, Franck Leprévost. Hardened Bloom Filters, with an Application to Unobservability |
23 | -- | 37 | Vaidas Juzonis, Nikolaj Goranin, Antanas Cenys, Dmitrij Olifer. Specialized Genetic Algorithm Based Simulation Tool Designed For Malware Evolution Forecasting |
39 | -- | 49 | Franciszek Seredynski, Jaroslaw Skaruz, Adrian Piraszewski. Image reconstruction with the use of evolutionary algorithms and cellular automata |
51 | -- | 67 | Urszula Krawczyk, Piotr Sapiecha. Automatic detection of DoS vulnerabilities of cryptographic protocols |
69 | -- | 81 | Bogdan Ksiezopolski, Damian Rusinek, Adam Wierzbicki. On the modelling of Kerberos protocol in the Quality of Protection Modelling Language (QoP-ML) |
83 | -- | 96 | Xiaobing He, Pawel Szalachowski, Zbigniew Kotulski, Nikos Fotiou, Giannis F. Marias, George C. Polyzos, Hermann de Meer. Energy-aware Key Management in Mobile Wireless Sensor Networks |
97 | -- | 112 | Grzegorz Orynczak, Zbigniew Kotulski. Notary-based self-healing mechanism for centralized peer-to-peer infrastructures |
113 | -- | 122 | Marcin Alan Tunia. Distributed Social Network - data security |
123 | -- | 139 | Wioletta Wójtowicz, Marek R. Ogiela. Security issues on digital watermarking algorithms |