Abstract is missing.
- An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh NetworksShapla Khanam, Habibullah Yusuf Saleem, Al-Sakib Khan Pathan. 1-14 [doi]
- Effective Ad Hoc Social Networking on OLSR MANET Using Similarity of Interest ApproachTeerapat Sanguankotchakorn, Shradha Shrestha, Nobuhiko Sugino. 15-28 [doi]
- Distributed Algorithms for the Creation of a New Distributed IDS in MANETsPaulo Manoel Mafra, Joni da Silva Fraga, Altair Olivo Santin. 29-42 [doi]
- Practical Privacy for Value-Added Applications in Vehicular Ad Hoc NetworksLei Zhang 0009, Qianhong Wu, Bo Qin, Josep Domingo-Ferrer. 43-56 [doi]
- Optimizing Streaming Server Selection for CDN-Delivered Live StreamingZhenyun Zhuang, Shun Kwok. 57-70 [doi]
- A Novel Hybrid IP Traceback Scheme with Packet CountersTomoyuki Karasawa, Masakazu Soshi, Atsuko Miyaji. 71-84 [doi]
- A Secure Mix Network with an Efficient Validity Verification MechanismKun Peng, Yuexin Zhang. 85-96 [doi]
- DLPR: A Distributed Locality Preserving Dimension Reduction AlgorithmMina Ghashami, Hoda Mashayekhi, Jafar Habibi. 97-110 [doi]
- A Leader-Based Reliable Multicast MAC Protocol for MPEG-4 TrafficMuhammad Khalil Afzal, Byung-Seo Kim, Sung Won Kim. 111-119 [doi]
- On Action Permutation and Progress for Partially Commutative Asynchronous Binary SessionsZhenguo Yang, Farong Zhong, Jinfang Zhang, Tiantian Song. 120-133 [doi]
- A NetFlow v9 Measurement System with Network Performance FunctionGuang Cheng, Hua Wu. 134-145 [doi]
- Efficient Ciphertext-Policy Attribute Based Encryption with Hidden PolicyXiaohui Li, Dawu Gu, Yanli Ren, Ning Ding, Kan Yuan. 146-159 [doi]
- MashStudio: An On-the-fly Environment for Rapid Mashup DevelopmentJianyu Yang, Jun Han, Xu Wang, Hailong Sun. 160-173 [doi]
- BSU: A Biased Seed Unchoking Algorithm for P2P SystemsXianglin Wei, Guomin Zhang, Jianhua Fan, Ming Chen 0003. 174-187 [doi]
- Towards a Secure and Available Smart Grid Using Intrusion ToleranceMaryam Tanha, Fazirulhisyam Hashim. 188-201 [doi]
- A Note on Constant-Round Concurrent Zero-Knowledge Arguments of Knowledge for NPHongda Li, Yang Liu, Qihua Niu. 202-216 [doi]
- On the Checkpointing Strategy in Desktop GridsDongping Wang, Bin Gong. 217-226 [doi]
- A Continuous Reverse Skyline Query Processing Considering the Mobility of Query ObjectsJongtae Lim, Yonghun Park, Kyoungsoo Bok, Jaesoo Yoo. 227-237 [doi]
- Performance Analysis of Wireless Intrusion Detection SystemsKhalid Nasr, Anas Abou El Kalam, Christian Fraboul. 238-252 [doi]
- Designated Condition One-Time SignaturesWei Gao, Kefei Chen, Guilin Wang, Xueli Wang. 253-263 [doi]
- SQL Injection Detection via Program Tracing and Machine LearningYi Wang, Zhoujun Li. 264-274 [doi]
- Limitation of Listed-Rule Firewall and the Design of Tree-Rule FirewallThawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda. 275-287 [doi]