Abstract is missing.
- Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc NetworksSancheng Peng, Weijia Jia, Guojun Wang. 3-9 [doi]
- Secure Message Distribution Scheme with Configurable Privacy for Heterogeneous Wireless Sensor NetworksYaHui Li, Ding Yong, Jianfeng Ma. 10-15 [doi]
- A Sanitizing Signature Scheme with IndexingAtsushi Koide, Raylin Tso, Eiji Okamoto. 16-21 [doi]
- Error Detection Schemes for CED in Block CiphersEwa Idzikowska, Krzysztof Bucholc. 22-27 [doi]
- An Impact-Oriented Metric for Interference to Network RoutingSong Huang, Lie-Gen Liu. 28-33 [doi]
- User-Directed Privacy Protection in the Ubiquitous EnvironmentJae Hun Lee, Jin-Kyu Park, Sang-Wook Kim. 37-42 [doi]
- Provably Secure Trusted Access Protocol for WLAN Mesh NetworksZhuo Ma, Jianfeng Ma, Yulong Shen. 43-48 [doi]
- Towards Trustworthy and Secure Kiosk Computing for Mobile UsersDong Zhou, Hiroshi Inamura. 49-54 [doi]
- Automatic Generation and Enforcement of Security Contract for Pervasive ApplicationYing Jin, Zepeng Li, Da Wei, Lei Liu. 55-60 [doi]
- A Qualitative Risk Analysis for the GPRS TechnologyChristos Xenakis, Danae Apostolopoulou, Angeliki Panou, Ioannis Stavrakakis. 61-68 [doi]
- Research of a Multi-dimension Measurement Trusting Model Based on Markov ChainHongyan Mao, Yixiang Chen. 71-76 [doi]
- Convertible Undeniable Partially Blind Signature from Bilinear PairingsAtsushi Koide, Raylin Tso, Eiji Okamoto. 77-82 [doi]
- Analyzing Privacy Designs of Mobile Social Networking ApplicationsGuanling Chen, Faruq Rahman. 83-88 [doi]
- Research on Endpoint Isolation and Remediation Mechanism Based on Trusted Access TechnologyZhenyu Wang, Xiangdong Li, Lining Yao, Qi Feng, Ruimin Wang. 89-93 [doi]
- Privacy Engine for Context-Aware Enterprise Application ServicesMarion Blount, John Davis, Maria Ebling, William F. Jerome, Barry Leiba, Xuan Liu, Archan Misra. 94-100 [doi]
- The Trustworthiness Based on Hash Chain in Wireless Sensor NetworkXiong Peng, Zhang Wei. 101-106 [doi]
- Trust Similarity Measure in Trust Model for P2P NetworksYizhi Ren, MingChu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai. 107-112 [doi]
- Distance Bounding Protocol for Multiple RFID Tag AuthenticationGaurav Kapoor, Wei Zhou, Selwyn Piramuthu. 115-120 [doi]
- Encryption and Decryption with Space Transformation for Bi-directional AssociationChien Pen Chuang, Tin-Ying Huang, Li-Chi Yeh. 121-126 [doi]
- Cryptanalysis of Li et al. s Identity-Based Threshold Signcryption SchemeS. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, N. Jain. 127-132 [doi]
- Online Signature Verification Algorithm Using Hill-Climbing MethodDaigo Muramatsu. 133-138 [doi]
- Converters for Designing Applied Cryptographic ProtocolsZhao Huawei, Qin Jing, Fang Zhifeng. 139-143 [doi]
- A Novel Self-Renewal Hash Chain and Its ImplementationHaojun Zhang, Xiaoxue Li, Rui Ren. 144-149 [doi]
- Strong Authentication Protocol for Secure RFID Tag Search without Help of Central DatabaseTae Youn Won, Ji Young Chun, Dong-Hoon Lee. 153-158 [doi]
- Providing Stronger Authentication at a Low Cost to RFID Tags Operating under the EPCglobal FrameworkPedro Peris-Lopez, Tong-Lee Lim, Tieyan Li. 159-166 [doi]
- Towards Successive Privacy Protection in Sensor NetworksBaoKang Zhao, Dan Wang, Zili Shao, Jiannong Cao, Keith C. C. Chan, Jinshu Su, Yanqin Yang. 167-172 [doi]
- Markov Model-Based Handwritten Signature VerificationAlan McCabe, Jarrod Trevathan. 173-179 [doi]
- An Efficient RFID Authentication Protocol for Low-Cost TagsYanfei Liu. 180-185 [doi]
- Trustworthy Semantic Web Technologies for Secure Knowledge ManagementBhavani M. Thuraisingham, Pranav Parikh. 186-193 [doi]
- An Improved Password-Based Authenticated Key Agreement Scheme for Pervasive ApplicationsMaw-Jinn Tsaur, Wei-Chi Ku, Hao-Rung Chung. 197-201 [doi]
- Efficient Client-to-Client Password Authenticated Key ExchangeYanjiang Yang, Feng Bao, Robert H. Deng. 202-207 [doi]
- A Self-Healing and Mutual-Healing Key Distribution Scheme Using Bilinear Pairings for Wireless NetworksBiming Tian, Song Han, Tharam S. Dillon. 208-215 [doi]
- Research on Pairwise Key Establishment for Cluster Heads in Sensor NetworksPing Li, Jiaying Wu, Jingming Xue. 216-221 [doi]
- A Key Management Scheme for Cluster Based Wireless Sensor NetworksReza Azarderakhsh, Arash Reyhani-Masoleh, Zine-Eddine Abid. 222-227 [doi]
- Key Management for Wireless Sensor Networks Using Trusted NeighborsYuan Xue, Helmut Jürgensen, Reza Azarderakhsh, Arash Reyhani-Masoleh. 228-233 [doi]
- An Improved Key Management Scheme for WEPLongjun Zhang, Tao Zou. 234-239 [doi]
- Property Verification for Generic Access Control ModelsVincent C. Hu, D. Richard Kuhn, Tao Xie. 243-250 [doi]
- ALHACF: An Anonymity-Level Selected Hierarchical Anonymous Communication FrameworkXin Chen, Huaping Hu, Bo Liu, Fengtao Xiao, Zunguo Huang. 251-256 [doi]
- Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time ConditionMinh-Triet Tran, Thanh Trung Nguyen, Isao Echizen. 257-263 [doi]
- Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role HierarchyYue Zhang 0002, James B. D. Joshi. 264-271 [doi]
- Identity Privacy Protection by Delayed Transmission in Pocket Switched NetworksXiaofeng Lu, Pan Hui, Pietro Liò, Zhang Xiong. 272-277 [doi]
- A Domain-Oriented Approach for Access Control in Pervasive EnvironmentsJun Li, Bruce Christianson. 278-284 [doi]
- Using Context Quality Indicators for Improving Context-Based Access Control in Pervasive EnvironmentsJosé Bringel Filho, Hervé Martin. 285-290 [doi]
- Trusted Spanning Tree for Delay Tolerant MANETsA. Piyatumrong, Pascal Bouvry, Frédéric Guinand, K. Lavangnananda. 293-299 [doi]
- Scalable and Secure Routing for Large-Scale Sensor NetworksFeilong Tang, Minyi Guo, Minglu Li, Zhijun Wang, Zixue Cheng. 300-305 [doi]
- Securing Wireless Sensor Networks Using Cluster ReformationsGicheol Wang, Deokjai Choi, Daewook Kang. 306-311 [doi]
- Ubiquitous and Secure Certificate Service for Mobile Ad Hoc NetworkMeng Ge, Kwok-Yan Lam, Jian-Bin Li, Siu Leung Chung. 312-317 [doi]
- HybridS: A Scheme for Secure Distributed Data Storage in WSNsWei Ren, Yi Ren, Hui Zhang. 318-323 [doi]
- SARC: A Street-Based Anonymous Vehicular Ad Hoc Routing Protocol for City EnvironmentHyuncheol Kim, Jungha Paik, Bumhan Lee, Donghoon Lee. 324-329 [doi]
- Exponential Hashing in Finite FieldsWenbin Luo, Gregory L. Heileman. 333-338 [doi]
- A Context Based Dynamic Access Control Model for Web ServiceChaowang Shang, Zongkai Yang, Qingtang Liu, Chengling Zhao. 339-343 [doi]
- Secure and Verifiable P2P Card GamesChun-Chao Yeh. 344-349 [doi]
- Defending against the Propagation of Active WormsXiang Fan, Yang Xiang. 350-355 [doi]
- Implementation and Evaluation of SIP-Based Secure VoIP Communication SystemJoongman Kim, Seokung Yoon, HyunCheol Jeong, Yoojae Won. 356-360 [doi]
- Securing Decentralized Workflows in Ambient EnvironmentsNicolai Kuntze, Julian Schütte. 361-366 [doi]
- An Application of Interval Analysis in Software Static AnalysisYawen Wang, Yunzhan Gong, Junliang Chen, Qing Xiao, Zhaohong Yang. 367-372 [doi]
- A Framework to Evaluate and Predict Performances in Virtual Machines EnvironmentDeshi Ye, Qinming He, Hua Chen, Jianhua Che. 375-380 [doi]
- Performance Measuring and Comparing of Virtual Machine MonitorsJianhua Che, Qinming He, Qinghua Gao, Dawei Huang. 381-386 [doi]
- An Optimized COW Block Device Driver in VMM for Fast, On-Demand Software DeploymentBin Chen, Nong Xiao, Zhiping Cai, Zhiying Wang. 387-392 [doi]
- Analysis and Enhancement for Interactive-Oriented Virtual Machine SchedulingYubin Xia, Yan Niu, Yansong Zheng, Ning Jia, Chun Yang, Xu Cheng. 393-398 [doi]
- DBTIM: An Advanced Hardware Assisted Full Virtualization ArchitectureWei Chen, Hongyi Lu, Li Shen, Zhiying Wang, Nong Xiao. 399-404 [doi]
- A Novel Virtual Grid Experiment Method in MedImGridRan Zheng, Xiaofei Liao, Hai Jin. 405-410 [doi]
- VirtualCluster: Customizing the Cluster Environment through Virtual MachinesKang Chen, Jun Xin, Weimin Zheng. 411-416 [doi]
- Allocating Resource in Grid Workflow Based on State PredictionJiong Yu, Guozhong Tian, Ling Cheng. 417-422 [doi]
- Cooperative Problem Solving Process Based on MAS_NP ModelYanbin Peng, Bei Shui Liao, Ji Gao, Jun Hu, CunHao Wang, Jie-Qing Ai, Hang Guo. 423-427 [doi]
- Simple Certificateless Signature with Smart CardsKazumasa Omote, Atsuko Miyaji, Kazuhiko Kato. 431-436 [doi]
- Efficient ID-based Threshold Ring Signature schemeJiang Han, Qiuliang Xu, Guohua Chen. 437-442 [doi]
- (In)Security of Efficient Tree-Based Group Key Agreement Using Bilinear MapRaphael C.-W. Phan, Bok-Min Goi. 443-446 [doi]
- UCaS: A Schedulability Analysis Tool for AADL ModelsShenglin Gui, Lei Luo, Qian Liu, Fulei Guo, Shaopeng Lu. 449-454 [doi]
- A GA-based Systematic Message Scheduling Method for Time-Triggered CANShan Ding, Zhiqiang Xie, Xiaona Yin. 455-460 [doi]
- Reducing Context Switch Overhead with Compiler-Assisted ThreadingPekka Jääskeläinen, Pertti Kellomäki, Jarmo Takala, Heikki Kultala, Mikael Lepistö. 461-466 [doi]
- Research and Design of Shared Resources Competition Solution among Hardware-Software Tasks based on Unified SchedulingBing Guo, Yan Shen, Lei Zhang, Xiang Zhou. 467-471 [doi]
- A Tiny Processing System for Education and Small Embedded Systems on the FPGAsKoji Nakano, Kensuke Kawakami, Koji Shigemoto, Yuki Kamada, Yasuaki Ito. 472-479 [doi]
- Object Placement for Fully Associative CacheChun-Chieh Lin, Chuen-Liang Chen. 480-485 [doi]
- Evaluation of Partitioning Methods for Stream Applications on a Heterogeneous Multi-core Processor SimulatorKai Zheng, Yongxin Zhu, Jun Xu. 486-491 [doi]
- A Connectivity Improving Mechanism for ZigBee Wireless Sensor NetworksTian-Wen Song, Chu-Sing Yang. 495-500 [doi]
- CayleyChord: A Novel P2P Overlay NetworkWenjun Xiao, Mingxin He, Wenhong Wei. 501-506 [doi]
- Improving BitTorrent Network s Performance via Deploying HelpersKe Xu, Yahui Yang, Tao Chen. 507-512 [doi]
- Adaptive Load Balancing for Lookups in Heterogeneous DHTZhi Chen, Guowei Huang, Jingdong Xu, Yang Yang. 513-518 [doi]
- The Impact of Backup Routes on the Routing and Wavelength Assignment Problem in WDM NetworksSimone Cintra Chagas, Eber Huanca Cayo, Koji Nakano, Jacir Luiz Bordim. 519-523 [doi]
- The Analysis and Simulation of a Hybrid Video Broadcast ArchitectureLei He, Xiangjie Ma, WeiLi Zhang, Yunfei Guo, Hailong Ma. 524-531 [doi]
- On the Impact of DoS Attacks on Secure Service DiscoverySlim Trabelsi, Guillaume Urvoy-Keller, Yves Roudier. 532-537 [doi]
- MAC Layer Misbehavior on Ad Hoc NetworksNicole R. Nagel, Ruzbeh Shokranian, Jacir Luiz Bordim, Koji Nakano. 538-542 [doi]
- CSON-D: An Ambient Network Aware Context Dissemination Scheme towards Ubiquitous NetworkingDineshbalu Balakrishnan, Amiya Nayak, Pulak Dhar. 543-548 [doi]
- Communications via Systems-on-Chips Clustering in Large-Scaled Sensor NetworksSharon Fan, Jeffrey Fan, Kia Makki, Niki Pissinou. 549-552 [doi]
- Discovery Architecture for the Tracing of Products in the EPCglobal NetworkGyeongtaek Lee, Jonghun Shin, Dae-Won Park, Hyuk-Chul Kwon. 553-558 [doi]
- Analysis of Web Service Substitutability Based on Typed Pi-CalculusJin-dian Su, Shan-shan Yu, He-qing Guo. 559-564 [doi]
- A Novel Platform for Context Maintenance and Discovery in a Ubiquitous EnvironmentQi Liu, Nigel Linge. 565-570 [doi]
- An Analytical Model for Broadcasting by Self Pruning in Wireless Ad Hoc NetworksYu Huang 0002, Bo Liu, XianPing Tao, Jiannong Cao, Beihong Jin. 571-576 [doi]
- A Context Management System for Supporting Context-Aware ApplicationsEunhoe Kim, Jaeyoung Choi. 577-582 [doi]
- Data Mining for Security ApplicationsBhavani M. Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen. 585-589 [doi]
- A Trusted Third Party Based Secure Authentication Scheme of E-CommerceLongjun Zhang, Tao Zou. 590-594 [doi]
- Attacks on Improved Key Distribution Protocols with Perfect ReparabilityRaphael C.-W. Phan, Bok-Min Goi. 595-599 [doi]
- Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust PropagationOmar Hasan, Jean-Marc Pierson, Lionel Brunie. 603-609 [doi]
- Probabilistic Trust Management in Pervasive ComputingMieso K. Denko, Tao Sun. 610-615 [doi]
- Discovering the Most Trusted Agents without Central ControlTomasz Kaszuba, Krzysztof Rzadca, Adam Wierzbicki. 616-621 [doi]
- Large-Scale USN Middleware Based on Context-AwareWon-Hee Han, Sung Won Kim, Sun-Mi Park, Chang-Wu Lee, Jong Hyuk Park, Young-Sik Jeong. 625-631 [doi]
- Mean-Variance Model for International Portfolio SelectionQiming Pan, Xiaoxia Huang. 632-636 [doi]
- A Mobile Agent-Supported Web Services Testing PlatformJia Zhang, Di Xu. 637-644 [doi]
- Speech Enhancement Using Spatial Processing and Modified Excitation Source for Underwater Speech CommunicationHyung-jun Ju, Se-Young Kim, Jung-woo Han, Ki-Man Kim, Seok-yeb Kang. 647-650 [doi]
- Research on the Encrypted Data Access Control of Multi-purpose Asynchronous WSNQian Sun, Shanqing Guo, Qiuliang Xu. 651-654 [doi]
- ELM-MAC: Energy Efficient Link Management by Using Optimal Transmission Power in MAC ProtocolPhil-Jung Yun, Changhwa Kim, Sangkyung Kim. 655-659 [doi]
- Energy-Efficient Routing Protocol in Underwater Acoustic Sensor NetworksHeungwoo Nam, Sunshin An. 663-669 [doi]
- Adaptive Energy Reservation MAC Protocol for Underwater Acoustic Sensor NetworksHung Trong Nguyen, Soo Young Shin, Soo-Hyun Park. 670-675 [doi]
- Scalable Uniformly-Distributed Clustering Mechanism for Sensor NetworksPhil-Jung Yun, Changhwa Kim, Sangkyung Kim, JaeNam Kim. 676-681 [doi]
- Point-to-Multipoint Ultrasonic Communication Modem for Ubiquitous Underwater Wireless Sensor NetworksMoo-Kwang Byeon, Jun-Ho Jeon, Sung-Joon Park. 685-688 [doi]
- Omnet++ Based Simulation for Underwater EnvironmentSoo Young Shin, Soo-Hyun Park. 689-694 [doi]
- On-Demand Deployment Algorithm for a Hybrid Sensor NetworkLiang-Cheng Shiu, Chao-Yang Lee, Tian-Wen Song, Chu-Sing Yang. 697-702 [doi]
- An Improved Design of the Ubiquitous Learning System Based on Sensor NetworksMianxiong Dong, Gongwei Zhang, Kaoru Ota, Song Guo, Minyi Guo. 703-708 [doi]
- A New Random Mobile Model for Analysis of Ad Hoc Networks Routing ProtocolsJiangwei Zhou, Boqin Feng, Gangqiang Wei. 711-716 [doi]
- Route Stability in Wireless Mesh Access NetworksUsman Ashraf, Slim Abdellatif, Guy Juanole. 717-722 [doi]
- A Cluster Based Stable Multicast Routing Protocol in Ad Hoc NetworkHao Xu, Dejun Mu. 723-728 [doi]