157 | -- | 160 | Anand R. Prasad, James Kempf. Security for Next Generation Communications |
161 | -- | 190 | Masahiro Kuroda, Mariko Yoshida, Ryoji Ono, Shinsaku Kiyomoto, Toshiaki Tanaka. Secure Service and Network Framework for Mobile Ethernet |
191 | -- | 203 | Craig Gentry, Zulfikar Ramzan. Provable Cryptographic Security and its Applications to Mobile Wireless Computing |
205 | -- | 219 | Neeli R. Prasad, Mahbubul Alam, Marina Ruggieri. Light-Weight AAA Infrastructure for Mobility Support Across Heterogeneous Networks |
221 | -- | 232 | Claude Castelluccia. Cryptographically Generated Addresses for Constrained Devices |
233 | -- | 246 | Amol Dabholkar, Kin Choong Yow. Efficient Implementation of Elliptic Curve Cryptography (ECC) for Personal Digital Assistants (PDAs) |
247 | -- | 261 | Robert C. Chalmers, Kevin C. Almeroth. A Security Architecture for Mobility-Related Services |
263 | -- | 281 | Sathish P. Alampalayam, Anup Kumar. An Adaptive and Predictive Security Model for Mobile Ad hoc Networks |
283 | -- | 301 | Kpatcha M. Bayarou, Matthias Enzmann, Elli Giessler, Michael Haisch, Brian Hunter, Mohammad Ilyas, Sebastian Rohr, Markus Schneider 0002. Towards Certificate-Based Authentication for Future Mobile Communications |
303 | -- | 321 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis. Experimental Analysis of an SSL-Based AKA Mechanism in 3G-and-Beyond Wireless Networks |
323 | -- | 350 | Neeli R. Prasad, Marina Ruggieri. Adaptive Security for Low Data Rate Networks |
351 | -- | 366 | Yuh-Min Tseng, Chou Chen Yang, Jiann-Haur Su. Authentication and Billing Protocols for the Integration of WLAN and 3G Networks |
367 | -- | 388 | Yuan Xue, Klara Nahrstedt. Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments |
389 | -- | 414 | James Kempf, Jari Arkko, Pekka Nikander. Mobile IPv6 Security |