Abstract is missing.
- An Intelligent Home System as a Development and Test Platform for Ubiquitous ComputingKeith C. C. Chan. 1 [doi]
- Remarks on Self-organization and Trust in Organic Computing SystemsHartmut Schmeck. 2 [doi]
- ZigBee Security Using Identity-Based CryptographySon Thanh Nguyen, Chunming Rong. 3-12 [doi]
- Efficient Identity-Based Signcryption Scheme for Multiple ReceiversYong Yu, Bo Yang, Xinyi Huang, Mingwu Zhang. 13-21 [doi]
- Identity-Based Proxy Signature from PairingsWei Wu, Yi Mu, Willy Susilo, Jennifer Seberry, Xinyi Huang. 22-31 [doi]
- Cryptanalysis of BGW Broadcast Encryption Schemes for DVD Content ProtectionQianhong Wu, Willy Susilo, Yi Mu, Bo Qin. 32-41 [doi]
- A Digital Signature Mechanism and Authentication Scheme for Group Communication in GridYunfa Li, Hai Jin, Deqing Zou, Jieyun Chen, Zongfen Han. 42-51 [doi]
- Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005Fanyu Kong, Jia Yu, Baodong Qin, Daxing Li. 52-60 [doi]
- Service-Context Knowledge-Based Solution for Autonomic AdaptationMarcel Cremene, Michel Riveill. 61-70 [doi]
- Middleware Based Context Management for the Component-Based Pervasive ComputingDi Zheng, Jun Wang, Yan Jia, Weihong Han, Peng Zou. 71-81 [doi]
- Building Autonomic and Secure Service Oriented Architectures with MAWeSValentina Casola, Emilio Pasquale Mancini, Nicola Mazzocca, Massimiliano Rak, Umberto Villano. 82-93 [doi]
- Biology as Inspiration Towards a Novel Service Life-CycleDavid Linner, Heiko Pfeffer, Ilja Radusch, Stephan Steglich. 94-102 [doi]
- Design of Service-Based Systems with Adaptive Tradeoff Between Security and Service DelayStephen S. Yau, Min Yan, Dazhi Huang. 103-113 [doi]
- Provably Secure Identity-Based Threshold Unsigncryption SchemeBo Yang, Yong Yu, Fagen Li, Ying Sun. 114-122 [doi]
- Final Fantasy - Securing On-Line Gaming with Trusted ComputingShane Balfe, Anish Mohammed. 123-134 [doi]
- An Efficient and Secure Rights Sharing Method for DRM System Against Replay AttackDonghyun Choi, Yunho Lee, Hogab Kang, Seungjoo Kim, Dongho Won. 135-145 [doi]
- Establishing Trust Between Mail Servers to Improve Spam FilteringJimmy McGibney, Dmitri Botvich. 146-155 [doi]
- An Architecture for Self-healing Autonomous Object GroupsHein Meling. 156-168 [doi]
- A Generic and Modular System Architecture for Trustworthy, Autonomous ApplicationsGeorge Brancovici, Christian Müller-Schloer. 169-178 [doi]
- Cooperative Component Testing Architecture in Collaborating Network EnvironmentGaeil An, Joon S. Park. 179-190 [doi]
- An Approach to a Trustworthy System Architecture Using VirtualizationFrederic Stumpf, Michael Benz, Martin Hermanowski, Claudia Eckert. 191-202 [doi]
- CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer NetworksRuichuan Chen, Xuan Zhao, Liyong Tang, Jian-bin Hu, Zhong Chen. 203-215 [doi]
- A Trust Evolution Model for P2P NetworksYuan Wang, Ye Tao, Ping Yu, Feng Xu, Jian Lü. 216-225 [doi]
- An Adaptive Trust Control Model for a Trustworthy Component Software PlatformZheng Yan, Christian Prehofer. 226-238 [doi]
- Towards Trustworthy Resource Selection: A Fuzzy Reputation Aggregation ApproachChunmei Gui, Quanyuan Wu, Huaimin Wang. 239-248 [doi]
- An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation SystemYufeng Wang, Yoshiaki Hori, Kouichi Sakurai. 249-258 [doi]
- Research on Cost-Sensitive Learning in One-Class Anomaly Detection AlgorithmsJun Luo, Li Ding 0003, Zhisong Pan, Guiqiang Ni, Guyu Hu. 259-268 [doi]
- Improved and Trustworthy Detection Scheme with Low Complexity in VBLAST SystemSo-Young Yeo, Myung-Sun Baek, Hyoung-Kyu Song. 269-275 [doi]
- Stepping-Stone Detection Via Request-Response Traffic AnalysisShou-Hsuan Stephen Huang, Robert Lychev, Jianhua Yang. 276-285 [doi]
- SPA Countermeasure Based on Unsigned Left-to-Right RecodingsSung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim. 286-295 [doi]
- A New One-Way Isolation File-Access Method at the Granularity of a Disk-BlockWenyuan Kuang, Yaoxue Zhang, Li Wei 0002, Nan Xia, Guangbin Xu, Yue-Zhi Zhou. 296-305 [doi]
- Novel Remote User Authentication Scheme Using Bilinear PairingsChen Yang, Wenping Ma, Xinmei Wang. 306-312 [doi]
- On the Homonymous Role in Role-Based Discretionary Access ControlKai Ouyang, Xiaowen Chu, Yixin Jiang, Hsiao-Hwa Chen, Jiangchuan Liu. 313-322 [doi]
- Ontology Based Hybrid Access Control for Automatic InteroperationYuqing Sun, Peng Pan, Ho-Fung Leung, Bin Shi. 323-332 [doi]
- Recoverable Tamper Proofing Technique for Image Authentication Using Irregular Sampling CodingKuo-Lung Hung, Chin-Chen Chang. 333-343 [doi]
- A Decomposition Strategy Based Trusted Computing Method for Cooperative Control Problem Faced with Communication ConstraintsShieh-Shing Lin. 344-351 [doi]
- Formal Analysis of Secure Bootstrap in Trusted ComputingShuyi Chen, Yingyou Wen, Hong Zhao. 352-360 [doi]
- Calculating Trust Using Aggregation Rules in Social NetworksSanguk Noh. 361-371 [doi]
- Enhancing Grid Security Using Trusted VirtualizationHans Löhr, HariGovind V. Ramasamy, Ahmad-Reza Sadeghi, Stefan Schulz, Matthias Schunter, Christian Stüble. 372-384 [doi]
- A Wearable System for Outdoor Running Workout State Recognition and Course ProvisionKatsuhiro Takata, Masataka Tanaka, Jianhua Ma, Runhe Huang, Bernady O. Apduhan, Norio Shiratori. 385-394 [doi]
- Malicious Participants in Group Key Exchange: Key Control and Contributiveness in the Shadow of TrustEmmanuel Bresson, Mark Manulis. 395-409 [doi]
- Efficient Implementation of the Keyed-Hash Message Authentication Code Based on SHA-1 Algorithm for Mobile Trusted ComputingMooseop Kim, Youngse Kim, Jaecheol Ryou, SungIk Jun. 410-419 [doi]
- A Secure DRM Framework for User s Domain and Key ManagementJinheung Lee, Sanggon Lee, Sanguk Shin. 420-429 [doi]
- A Secret-Key Exponential Key Agreement Protocol with Smart CardsEun-Jun Yoon, Kee-Young Yoo. 430-440 [doi]
- Key Establishment Scheme for Sensor Networks with Low Communication CostYong Ho Kim, Hwaseong Lee, Jong Hyuk Park, Laurence Tianruo Yang, Dong-Hoon Lee. 441-448 [doi]
- A Worm Containment Model Based on Neighbor-AlarmJianming Fu, Binglan Chen, Huanguo Zhang. 449-457 [doi]
- A Distributed Self-healing Data StoreWolfgang Trumler, Jörg Ehrig, Andreas Pietzowski, Benjamin Satzger, Theo Ungerer. 458-467 [doi]
- Malicious Codes Detection Based on Ensemble LearningBoyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang. 468-477 [doi]
- Generating Simplified Regular Expression Signatures for Polymorphic WormsYong Tang, Xicheng Lu, Bin Xiao. 478-488 [doi]
- AAA for Spontaneous Roaming Agreements in Heterogeneous Wireless NetworksZhi (Judy) Fu, Minho Shin, John C. Strassner, Nitin Jain, Vishnu Ram, William A. Arbaugh. 489-498 [doi]
- A Prediction-Based Fair Replication Algorithm in Structured P2P SystemsXianshu Zhu, Dafang Zhang, Wenjia Li, Kun Huang. 499-508 [doi]
- TransCom: A Virtual Disk Based Self-management SystemLi Wei 0002, Yaoxue Zhang, Yue-Zhi Zhou. 509-518 [doi]
- Defending Against Jamming Attacks in Wireless Local Area NetworksWei Chen, Danwei Chen, Guozi Sun, Yingzhou Zhang. 519-528 [doi]
- Schedulability Analysis of the Fault-Tolerant Hard Real-Time Tasks with Limited Priority LevelsJun Li, Fumin Yang, Gang Tu, Wan-hua Cao, Yansheng Lu. 529-538 [doi]
- A Property-Based Technique for Tolerating Faults in Bloom Filters for Deep Packet InspectionYoon-Hwa Choi, Myeong-Hyeon Lee. 539-548 [doi]
- A Fuzzy Logic Approach for Secure and Fault Tolerant Grid Job SchedulingCongfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao. 549-558 [doi]
- An Enhanced DGIDE Platform for Intrusion DetectionFang-Yie Leu, Fuu-Cheng Jiang, Ming-Chang Li, Jia-Chun Lin. 559-568 [doi]