Abstract is missing.
- Large-Scale Urban Mesh Networks: from Deployment to ApplicationsEdward W. Knightly. [doi]
- In Search of the Next Big ThingBob Ianucci. [doi]
- Transport-Layer Design Perspectives for Heterogeneous NetworksVassilis Tsaoussidis. [doi]
- The BehaviorScope Project: Experiences from the Design, Implementation and Deployment of a Camera Sensor NetworkAndreas Savvides. [doi]
- LEMA: Localized Energy-Efficient Multicast Algorithm based on Geographic RoutingJuan A. Sánchez, Pedro M. Ruiz. 3-12 [doi]
- Energy-efficient Interleaving for Error Recovery in Broadcast NetworksKyungtae Kang, Yongwoo Cho, Heonshik Shin. 13-19 [doi]
- Performance Study of Power Saving Classes of Type I and II in IEEE 802.16eLei Kong, Danny H. K. Tsang. 20-27 [doi]
- Ethernet Adaptive Link Rate: System Design and Performance EvaluationChamara Gunaratne, Kenneth J. Christensen. 28-35 [doi]
- Performance Aware Design of Communication SystemsLukas Pustina, Michael Gerharz, Peter Martini, Simon Schwarzer, Volker Deichmann. 39-46 [doi]
- Minimizing Cache Misses in an Event-driven Network Server: A Case Study of TUXSapan Bhatia, Charles Consel, Julia L. Lawall. 47-54 [doi]
- Buffer Management for 3D Image-based Rendering over Wireless Network with QoS AdaptationAzzedine Boukerche, Jing Feng. 55-62 [doi]
- Efficient Packet Processing in User-Level OSes: A Study of UMLYounggyun Koh, Calton Pu, Sapan Bhatia, Charles Consel. 63-70 [doi]
- Fair Scheduling over multiple servers with flow-dependent server rateSatya Ranjan Mohanty, Laxmi N. Bhuyan. 73-80 [doi]
- An Adaptive Non-preemptive Scheduling Framework for Delay Bounded Traffic in Cellular NetworksYaser Khamayseh, Ehab S. Elmallah. 81-88 [doi]
- Bandwidth Aware Slot Allocation in Hybrid MACYuvraj. K. Rana, Bao Hua Liu, Alfandika Nyandoro, Sanjay Jha. 89-96 [doi]
- A Congestion-aware Medium Access Control Protocol for Multi-rate Ad-hoc NetworksTimo Zauner, Luke Haslett, Wen Hu, Sanjay Jha, Cormac J. Sreenan. 97-104 [doi]
- Computing Real Time Jobs in P2P NetworksJingnan Yao, Jian Zhou, Laxmi N. Bhuyan. 107-114 [doi]
- Achieving Resilient and Efficient Load Balancing in DHT-based P2P SystemsDi Wu, Ye Tian, Kam-Wing Ng. 115-122 [doi]
- Content-based Packet Marking for Application-Aware Processing in Overlay NetworksPanho Lee, Tarun Banka, Anura P. Jayasumana, V. Chandrasekar. 123-131 [doi]
- Considerations of SCTP Retransmission Delays for Thin StreamsJon Pedersen, Carsten Griwodz, Pål Halvorsen. 135-142 [doi]
- A New Stable AQM Algorithm Exploiting RTT EstimationHayato Hoshihara, Hisashi Koga, Toshinori Watanabe. 143-150 [doi]
- Adapting TCP for Vertical Handoffs in Wireless NetworksLaila Daniel, Markku Kojo. 151-158 [doi]
- Emulating TCP (A Reliable Internet Protocol) Using a Fixed Point AlgorithmDebessay Fesehaye Kassa. 159-165 [doi]
- An Interior Path Vector Routing ProtocolConor Creagh, Cormac J. Sreenan. 169-176 [doi]
- Maximum Data Collection Least-Cost Routing in Energy Constrained Wireless Sensor NetworksKa-Lok Hung, Brahim Bensaou, Junhua Zhu, Farid Naït-Abdesselam. 177-184 [doi]
- On Cache Prefetching Strategies For Integrated Infostation-Cellular NetworkJerry Chun-Ping Wang, Hossam ElGindy, Justin Lipman. 185-192 [doi]
- Detecting Botnets with Tight Command and ControlW. Timothy Strayer, Robert Walsh, Carl Livadas, David E. Lapsley. 195-202 [doi]
- Can CRLs Provide Bandwidth-Efficient Online Certificate Status?Anantharaman Lakshminarayanan, Aditya Liviandi, Tong-Lee Lim, William Chui. 203-210 [doi]
- Modelling Voice Communication in Disaster Area ScenariosNils Aschenbruck, Michael Gerharz, Matthias Frank, Peter Martini. 211-220 [doi]
- Security for FTTx Optical Access NetworksWalid Shawbaki, Ahmed E. Kamal. 221-228 [doi]
- Clustered Mobility Model for Scale-Free Wireless NetworksSunho Lim, Chansu Yu, Chita R. Das. 231-238 [doi]
- Landscape-3D; A Robust Localization Scheme for Sensor Networks over Complex 3D TerrainsLiqiang Zhang, Xiaobo Zhou, Qiang Cheng. 239-246 [doi]
- Adaptive Location Update Area Design for PCS Networks under 2D Markov Walk ModelJun Zheng, Yan Zhang, Ling Wang, Jinlin Chen. 247-253 [doi]
- Design of a Giga-bit Hardware Accelerator for the iSCSI InitiatorChung-Ho Chen, Yi-Cheng Chung, Chen-Hua Wang, Han-Chiang Chen. 257-263 [doi]
- Efficient Java Communication Protocols on High-speed Cluster InterconnectsGuillermo L. Taboada, Juan Touriño, Ramon Doallo. 264-271 [doi]
- An Integrated Hardware Solution for MAC Address Translation, MPLS, and Traffic Management in Access NetworksHarald Widiger, Stephan Kubisch, Thomas Bahls, Dirk Timmermann. 272-279 [doi]
- Effect of Hash Collisions on the Performance of LAN Switching Devices and NetworksChris Huntley, Galina Antonova, Paul Guinand. 280-284 [doi]
- Exploiting Rate Diversity for Multicasting in Multi-Radio Wireless Mesh NetworksJunaid Qadir, Chun Tung Chou, Archan Misra. 287-294 [doi]
- Link availability and its effects on the capacity of mobile ad hoc wireless networks an analytical approachRuchi Sharma, Ravi Bhagavathula, Kamesh Namuduri, Ravi Pendse. 295-299 [doi]
- Toward a Seamless Communication Architecture for In-building Networks at the 60 GHz bandBao Linh Dang, R. Venkatesha Prasad, Ignas G. Niemegeers, M. Garcia Larrode, A. M. J. Koonen. 300-307 [doi]
- Hybrid Distributed Coordination Function for Next-Generation High-Bandwidth WLANsNakjung Choi, Seongil Han, Yongho Seok, Yanghee Choi, Taekyoung Kwon. 308-315 [doi]
- A Transceiver Saving Auxiliary Graph Model for Dynamic Traffic Grooming in WDM Mesh NetworksHuaxiong Yao, Zongkai Yang, Liang Ou, Xiansi Tan. 319-326 [doi]
- Integration of Differentiated Services in Optical Burst Switching Metro Ring NetworksHui-Tang Lin, Wang-Rong Chang. 327-334 [doi]
- Traffic Grooming in Statistically Shared Optical NetworksSrivatsan Balasubramanian, Arun K. Somani. 335-342 [doi]
- Optical CDMA Code Collision and Translation Performance AnalysisAnh Duy Nguyen, Deniz Gurkan. 343-349 [doi]
- Ontology Modeling of a Dynamic Protocol StackLiFeng Zhou, Hung Keng Pung, Lek Heng Ngoh, Tao Gu. 353-360 [doi]
- Towards Semantic Modeling for QoS SpecificationLiFeng Zhou, Hung Keng Pung, Lek Heng Ngoh. 361-368 [doi]
- Training on multiple sub-flows to optimise the use of Machine Learning classifiers in real-world IP networksThuy T. T. Nguyen, Grenville J. Armitage. 369-376 [doi]
- Biologically-Inspired Adaptive Data Aggregation for Multi-Modal Wireless Sensor NetworksPruet Boonma, Junichi Suzuki. 377-386 [doi]
- Real-Time Communication in 802.11 Networks: The Virtual Token Passing VTP-CSMA ApproachRicardo Moraes, Francisco Vasques, Paulo Portugal, José Alberto Fonseca. 389-396 [doi]
- Experimental investigation on VoIP performance and the resource utilization in 802.11b WLANsMiroslaw Narbutt, Mark Davis. 397-403 [doi]
- Delay Distribution Analysis of the RTS/CTS mechanism of IEEE 802.11Paschalis Raptis, Albert Banchs, Vasileios Vitsas, Konstantinos Paparrizos, P. Chatzimisios. 404-410 [doi]
- Maximizing Differentiated Throughput in IEEE 802.11e Wireless LANsJongwon Yoon, Sangki Yun, Hyogon Kim, Saewoong Bahk. 411-417 [doi]
- Performance Limits and Analysis of Contention-based IEEE 802.11 MACShao-Cheng Wang, Ahmed Helmy. 418-425 [doi]
- Residual Admission Capacity in Optical Burst Switching Networks and its Application in Routing Loss-Guaranteed FlowsQian Chen, Gurusamy Mohan, Kee Chaing Chua. 429-436 [doi]
- Embedding Hypercube Communications on Optical Chordal Ring NetworksYawen Chen, Hong Shen, Haibo Zhang. 437-442 [doi]
- Delay Constrained Traffic Grooming in WDM Ring NetworksArun Vishwanath, Weifa Liang. 443-450 [doi]
- Rerouting Schemes with Inter-layer Backup Resource Sharing for Differentiated Survivability in IP-over-WDM Optical NetworksKrishanthmohan Ratnam, Mohan Gurusamy, Luying Zhou. 451-458 [doi]
- An Efficient MAC Protocol For Optical WDM Networks with Simulation EvaluationGe Nong, Sen Zhang, Xiaola Lin. 459-464 [doi]
- Protecting Multicast Sessions in Wireless Mesh NetworksXin Zhao, Chun Tung Chou, Jun Guo, Sanjay Jha. 467-474 [doi]
- The Internet Group Management Protocol with Access Control (IGMP-AC)Salekul Islam, J. William Atwood. 475-482 [doi]
- Making Application Layer Multicast Reliableis FeasibleBin Rong, Ibrahim Khalil, Zahir Tari. 483-490 [doi]
- Performance of multicast over bidirectional slotted ring networksMohamad Chaitou, Gérard Hébuterne, Hind Castel. 491-498 [doi]
- Detecting Malicious Peers in Overlay Multicast StreamingSamarth Shetty, Patricio Galdames, Wallapak Tavanapong, Ying Cai. 499-506 [doi]
- Cerco: Supporting Range Queries with a Hierarchically Structured Peer-to-Peer SystemSimon Rieche, Klaus Wehrle, Leo Petrak, Clemens Wrzodek. 509-510 [doi]
- Performance of Constant Quality VideoApplications using the DCCP Transport ProtocolJeroen Van Velthoven, Kathleen Spaey, Chris Blondia. 511-512 [doi]
- BEAM: An Efficient Peer to Peer Media Streaming FrameworkDarshan Purandare, Ratan K. Guha. 513-514 [doi]
- MPLS Based Approach for Heterogeneous and Scalable Multicast in DiffServMohamed El Hachimi, Abdelhafid Abouaissa. 515-518 [doi]
- Power-Proxying on the NIC: A Case Study with the Gnutella File-Sharing ProtocolPradeep Purushothaman, Mukund Navada, Rajagopal Subramaniyan, Casey Reardon, Alan D. George. 519-520 [doi]
- Dynamic Programming-based Energy-Efficient Rate Adaptation for Wireless Ad Hoc NetworksMaciej J. Zawodniok, Sarangapani Jagannathan. 521-524 [doi]
- A Multicast Tree Reconstruction Method for Many-to-Many Mobile Communications with Delay ConstraintTsuyoshi Yamada, Shoji Yoshimura, Keita Kawano, Kazuhiko Kinoshita, Koso Murakami. 525-526 [doi]
- Achieving Fairness in IEEE 802.11 Ad Hoc NetworksFanilo Harivelo, Pascal Anelli. 527-528 [doi]
- A Traffic Shaping Heuristic for Congestion Control in Optical Burst-Switched NetworksMushi Jin, Oliver W. W. Yang. 529-530 [doi]
- The Design of Efficient Hashing Techniques for IP Address LookupDevang Pandya, Christopher J. Martinez, Wei-Ming Lin, Parimal Patel. 531-532 [doi]
- Ethernet Adaptive Link Rate (ALR): Analysis of a MAC Handshake ProtocolHimanshu Anand, Casey Reardon, Rajagopal Subramaniyan, Alan D. George. 533-534 [doi]
- An Enhancement of TCP Veno over High Bandwidth-Delay Product NetworksBin Zhou, Cheng Peng Fu. 535-536 [doi]
- HYDRA: A Novel Framework for Making High-Performance Computing Offload CapableYaron Weinsberg, Danny Dolev, Tal Anker, Pete Wyckoff. 537-539 [doi]
- Characterization of Layer-2 Unique Topologies in Multisubnet Local Area NetworksHassan Gobjuka, Yuri Breitbart. 540-542 [doi]
- Data Aggregation System for Distributing Inter-Vehicle Warning MessagesStephan Eichler, Christian Merkle, Markus Strassberger. 543-544 [doi]
- TA2I: Time Slot Access with Acknowledge InsertionMarcel Wille, Harald Richter. 545-548 [doi]
- Towards Minimizing Service Degradation during MIPv6 HandoversYan Cheng, J. William Atwood. 549-550 [doi]
- VoIP Capacity over Wireless Mesh NetworksBin Hong Lee, Guan Yan Cai, Yu Ge, Winston Khoon Guan Seah. 551-552 [doi]
- Traffic Shaping and Dimensioning of an External Overload Controller in Service ArchitecturesJens Andersson, Christian Nyberg, Maria Kihl. 553-554 [doi]
- Mitigating Worm Propagation on Virtual LANsSaeed Rajput, Xiaoguang Sun, Sam Hsu. 555-556 [doi]
- QoS Differentiation Provisioning & Management System Exploiting Mobile Agent TechnologyAngelos Michalas, Malamati D. Louta, Vassilis Loumos, Dimitrios Zisopoulos, Georgia Charitoudi. 557-558 [doi]
- A New Bandwidth Access Framework in Slotted-OPS NetworksAkbar Ghaffar Pour Rahbar, Oliver W. W. Yang. 559-560 [doi]
- Improved Collaborative Environment Control Using Mote-based Sensor/Actuator NetworksMasayuki Nakamura, Atsushi Sakurai, Toshio Watanabe, Jiro Nakamura, Hiroshi Ban. 561-562 [doi]
- Communication-assisted Topology Control of Semi-autonomous RobotsMiguel A. Labrador. 563-564 [doi]
- Scalability of Location Sensor Data FusionTom Pfeifer, Kieran Sullivan, Mícheál Ó Foghlú. 565-566 [doi]
- Port-based Multihomed Mobile IPv6 for Heterogeneous NetworksChrister Åhlund, Robert Brännström, Karl Andersson, Örjan Tjernström. 567-568 [doi]
- Performance of TCP with Directional AntennasSivaram Cheekiralla, Daniel W. Engels. 569-570 [doi]
- Needles in Haystacks: Practical Intrusion Detection from Theoretical ResultsGerald A. Marin, William H. Allen. 571-573 [doi]
- Viral IP Address AssignmentSivaram Cheekiralla, Daniel W. Engels. 574-575 [doi]
- ROADNet: A network of SensorNetsTodd Hansen, Sameer Tilak, Steve Foley, Kent Lindquist, Frank Vernon, Arcot Rajasekar, John Orcutt. 579-587 [doi]
- Car-Park Management using Wireless Sensor NetworksJonathan P. Benson, Tony O Donovan, Padraig O Sullivan, Utz Roedig, Cormac J. Sreenan, John Barton, Aoife Murphy, Brendan O Flynn. 588-595 [doi]
- Wireless Sensor Networks: The Quest for Planetary Field SensingElena I. Gaura, Robert M. Newman. 596-603 [doi]
- Animal Behaviour Understanding using Wireless Sensor NetworksYing Guo, P. Corke, Geoff Poulton, Tim Wark, Greg Bishop-Hurley, Dave Swain. 607-614 [doi]
- Practical Design of A Sensor Network for Understanding Nursing ActivitiesRen Ohmura, Futoshi Naya, Haruo Noma, Noriaki Kuwahara, Tomoji Toriyama, Kiyoshi Kogure. 615-622 [doi]
- Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor NetworksMartin Passing, Falko Dressler. 623-629 [doi]
- Atlas: A Service-Oriented Sensor Platform: Hardware and Middleware to Enable Programmable Pervasive SpacesJeffrey King, Raja Bose, Hen-I Yang, Steven Pickles, Abdelsalam Helal. 630-638 [doi]
- Cross-Level Sensor Network Simulation with COOJAFredrik Österlind, Adam Dunkels, Joakim Eriksson, Niclas Finne, Thiemo Voigt. 641-648 [doi]
- Service-Driven Query Routing in Sensor NetworksAbdelmounaam Rezgui. 649-655 [doi]
- RMD: Reliable Multicast Data Dissemination within Groups of Collaborating ObjectsMihai Marin-Perianu, Paul J. M. Havinga. 656-663 [doi]
- Routing Performance in CDMA-based Sensor Networks for Different Energy MetricsWenjing Wang, Fei Xie, Mainak Chatterjee. 664-671 [doi]
- Identification of Network Bricks in Heterogeneous ScenariosAlessio Botta, Antonio Pescapè, Giorgio Ventre. 675-682 [doi]
- Enhanced Network-State Estimation using Change DetectionErik Hartikainen, Svante Ekelin. 683-693 [doi]
- Multi-Channel Interference Measurements for Wireless Sensor NetworksÖzlem Durmaz Incel, Stefan Dulman, Pierre G. Jansen, Sape J. Mullender. 694-701 [doi]
- Flexible Flow Aggregation for Adaptive Network MonitoringFalko Dressler, Gerhard Münz. 702-709 [doi]
- Experimental and Analytical Evaluation of Available Bandwidth Estimation ToolsCesar D. Guerrero, Miguel A. Labrador. 710-717 [doi]
- Packet Dispersion in IEEE 802.11 Wireless NetworksMingzhe Li, Mark Claypool, Robert E. Kinicki. 721-729 [doi]
- Accuracy-Speedup Tradeoffs for a Time-Parallel Simulation of Wireless Ad hoc NetworksGuoqiang Wang, Damla Turgut, Ladislau Bölöni, Dan C. Marinescu. 730-737 [doi]
- Optimal Multi-hop Cellular Architecture for Wireless CommunicationsYik Hung Tam, Hossam S. Hassanein, Selim G. Akl, Robert Benkoczi. 738-745 [doi]
- SCTP Extension for EGPRS/WLAN Handover DataMériem Afif, Philippe Martins, Sami Tabbane, Philippe Godlewski. 746-750 [doi]
- DMAP: A Scalable and Efficient Integrated Mobility and Service Management Scheme for Mobile IPv6 SystemsIng-Ray Chen, Weiping He, Baoshan Gu. 753-760 [doi]
- Intelligent Multiple-Criteria Broadcasting in Mobile Ad-hoc NetworksBarrit J. Barritt, Behnam Malakooti, Zhihao Guo. 761-768 [doi]
- A Novel Data Mining Technique for Extracting Events and Inter Knowledge based Information from Wireless Sensor NetworksAzzedine Boukerche, Samer Samarah. 769-775 [doi]
- On Measuring Anonymity For Wireless Mobile Ad-hoc NetworksDijiang Huang. 779-786 [doi]
- Efficient Algorithms for Secure Multicast key ManagementElham Khabiri, Saïd Bettayeb. 787-792 [doi]
- Impact of Stochastic Traffic Characteristics on Effective Capacity in CDMA NetworksHongxia Sun, Qian Wu, Carey Williamson. 793-800 [doi]
- Performance Analysis of MANET Routing Protocols in the Presence of Self-Similar TrafficAhmed Al-Maashri, Mohamed Ould-Khaoua. 801-807 [doi]
- Performance Analysis of Tunneling Protocols used in a Mobile Network with Mobile RouterSewook Oh, Bong Chan Kim, Sangman Bak, Hwang Soo Lee. 811-818 [doi]
- Energy Characterization of Reed-Solomon Decoding in 3G BroadcastingJunhee Ryu, Kyungtae Kang, Yongwoo Cho, Joonho Lee, Heonshik Shin. 819-824 [doi]
- Adaptive Antennas for Interference Mitigation of Barker/CCK Spread Wi-Fi SignalsAyham Z. Al-Banna, Joseph L. LoCicero, Donald R. Ucci. 825-831 [doi]
- A Wireless Actor and Sensor Networks QoS-Aware Routing Protocol for the Emergency Preparedness Class of ApplicationsAzzedine Boukerche, Regina Borges de Araujo, Leandro Villas. 832-839 [doi]
- Architectural and Management Schemes for Efficient Data Collection in Wireless Sensor NetworksMohamed Younis, Samuel Bushra. 843-844 [doi]
- A Delay-bounded Multi-Channel Routing Protocol for Wireless Mesh Networks using Multiple Token Rings: Extended SummaryDavid Lin, Teng-Sheng Moh, W. Melody Moh. 845-847 [doi]
- Measuring User Experience Accurately in Wireless NetworksSanjay Kodali, Jey Veerasamy. 848-849 [doi]
- Hybrid Broadcast-Unicast distribution of Mobile TV over 3G NetworksThorsten Lohmar, Uwe Horn. 850-851 [doi]
- Analysis of Exponential Backoff with Multipacket Reception in Wireless NetworksPeng Xuan Zheng, Ying Jun Zhang, Soung Chang Liew. 855-862 [doi]
- Utility-based Packet Scheduler for Wireless CommunicationsAna Aguiar, Adam Wolisz, Horst Lederer. 863-870 [doi]
- Merit of PHY-MAC Cross-Layer Carrier Sensing: A MAC-Address-based Physical Carrier Sensing Scheme for Solving Hidden-Node and Exposed-Node Problems in Large-Scale Wi-Fi NetworksAn Chan, Soung Chang Liew. 871-878 [doi]
- On Access Point Selection in IEEE 802.11 Wireless Local Area NetworksMurad Abusubaih, James Gross, Sven Wiethölter, Adam Wolisz. 879-886 [doi]
- Transport Protocol Behavior and Energy-Saving PotentialLefteris Mamatas, Vassilis Tsaoussidis. 889-896 [doi]
- Using Quick-Start to Improve TCP Performance with Vertical Hand-offsPasi Sarolahti, J. Korhonen, Laila Daniel, Markku Kojo. 897-904 [doi]
- Design and Implementation of a Rate Control Mechanism for Image-based Virtual Exploration over Wireless NetworksAzzedine Boukerche, Richard Werner Nelem Pazzi, Firas Kazem. 905-912 [doi]
- An Efficient Dynamic Multicast Protocol for Mobile IPv6 NetworksZheng Wan. 913-920 [doi]
- ZONER: A ZONE-based Sensor Relocation Protocol for Mobile Sensor NetworksXu Li, Nicola Santoro. 923-930 [doi]
- Energy-Efficient Cluster-Based Service Discovery in Wireless Sensor NetworksRaluca Marin-Perianu, Hans Scholten, Paul J. M. Havinga, Pieter H. Hartel. 931-938 [doi]
- Linux Implementation and Evaluation of a Cooperation Mechanism for Hybrid Wireless NetworksAttila Weyland, Torsten Braun, Thomas Staub, Carolin Latze. 939-946 [doi]
- Wireless Multi-hop Network Scenario Emulation with MinMax ErrorHuizhou Zhao, Wei Yan, Tong Zhao, Xiaoming Li. 949-951 [doi]
- Performance improvement for cross flows in ad hoc wireless networks using 802.11Satoko Itaya, Jun Hasegawa, Peter Davis, Naoto Kadowaki, Sadao Obana. 952-953 [doi]
- Sensor Networks Routing via Bayesian ExplorationShuang Hao, Ting Wang. 954-955 [doi]
- Detecting Selective Dropping Attacks in BGPMooi Choo Chuah, Kun Huang. 959-966 [doi]
- Using Machine Learning Techniques to Identify Botnet TrafficCarl Livadas, Robert Walsh, David E. Lapsley, W. Timothy Strayer. 967-974 [doi]
- Privacy-Preserving Quick Authentication in Fast Roaming NetworksJun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang. 975-982 [doi]
- The Effect of Rebalancing on the Performance of a Group Key Agreement ProtocolShanyu Zheng, Jim Alves-Foss, Stephen S. Lee. 983-989 [doi]
- Simultaneous Support of Multiple Security Protocols in a Group Communication GatewayJens Tölle, Harald Schmidt. 993-999 [doi]
- Integrated Security Verification and Validation: Case StudyDorina Ghindici, Gilles Grimaud, Isabelle Simplot-Ryl, Yanguo Liu, I. Traore. 1000-1007 [doi]
- A Model-based Approach to the Security Testing of Network Protocol ImplementationsWilliam H. Allen, Chin Dou, Gerald A. Marin. 1008-1015 [doi]
- Indicator Random Variables in Traffic Analysis and the Birthday ProblemPhillip G. Bradford, Irina Perevalova, Michiel H. M. Smid, Charles B. Ward. 1016-1023 [doi]