Abstract is missing.
- GENI - global environment for network innovationsChip Elliott. 8 [doi]
- Distributed search revisited: Resolving the conflict of flexibility and efficiencyRaouf Boutaba. 9-10 [doi]
- Cooperative caching: The case for P2P trafficMohamed Hefeeda, Behrooz Noorizadeh. 12-19 [doi]
- Experimental comparison of peer-to-peer streaming overlays: An application perspectiveJeff Seibert, David Zage, Sonia Fahmy, Cristina Nita-Rotaru. 20-27 [doi]
- Range queries and load balancing in a hierarchically structured P2P systemSimon Rieche, Bui The Vinh, Klaus Wehrle. 28-35 [doi]
- Constructing low-latency overlay networks: Tree vs. mesh algorithmsKnut-Helge Vik, Carsten Griwodz, Pål Halvorsen. 36-43 [doi]
- IP address assignment in wireless mesh networksAlexander Zimmermann, Volker Bohme, Arnd Hannemann. 44-51 [doi]
- An efficient cooperation of on-demand and proactive modes in Hybrid Wireless Mesh ProtocolWon-Ju Yoon, Sang-Hwa Chung, Seong Joon Lee, Yun-Sung Lee. 52-57 [doi]
- CORE: centrally optimized routing extensions for the IEEE 802.16 MeSH modeParag S. Mogre, Nico d Heureuse, Matthias Hollick, Ralf Steinmetz. 58-65 [doi]
- Reducing network cost of many-to-many communication in unidirectional WDM rings with network codingLong Long, Ahmed E. Kamal. 66-73 [doi]
- Reconstructing the Plenoptic function from wireless multimedia sensor networksAzzedine Boukerche, Jing Feng, Richard Werner Nelem Pazzi, Yan Du, Ying Huang. 74-81 [doi]
- Improving information availability in storage-centric sensor networksNam Nguyen, Sudha Krishnamurthy, Peng Xie, Douglas Jones. 82-90 [doi]
- Delay constrained placement of mobile data collectors in underwater acoustic sensor networksWaleed Alsalih, Hossam S. Hassanein, Selim G. Akl. 91-97 [doi]
- Path guiding mechanisms for a mobile anchor improving or balancing location accuracies of static sensors in WSNsChih-Yung Chang, Chao-Tsun Chang, Sheng-Wen Chang, Yu-Chieh Chen, Ming-Hsien Li. 98-105 [doi]
- Efficient power management for Wireless Sensor Networks: A data-driven approachMingJian Tang, Jinli Cao, Xiaohua Jia. 106-113 [doi]
- Neighborhood aware power saving mechanisms for ad hoc networksAbdelfattah Belghith, Wafa Akkari. 114-121 [doi]
- Energy efficient Ethernet encodingsYanpei Chen, Tracy Xiaoxiao Wang, Randy H. Katz. 122-129 [doi]
- Energy-saving scheduling in IEEE 802.16e networksChia-Yen Lin, Hsi-Lu Chao. 130-135 [doi]
- Scalability considerations for an anomaly-free iBGP routingUli Bornhauser, Peter Martini, Martin Horneffer. 136-143 [doi]
- Spherical Coordinate Routing for 3D wireless ad-hoc and sensor networksShao Tao, Akkihebbal L. Ananda, Mun Choon Chan. 144-151 [doi]
- A new approach for the construction of multiple multicast trees using multiple description video for wireless ad hoc networksOsamah Badarneh, Michel Kadoch, Ahmed K. Elhakeem. 152-159 [doi]
- Single-path routing for life time maximization in multi-hop wireless networksYigal Bejerano, Seung-Jae Han, Keon-Taek Lee, Amit Kumar. 160-167 [doi]
- DiCAP: Distributed Packet Capturing architecture for high-speed network linksCristian Morariu, Burkhard Stiller. 168-175 [doi]
- TCP mechanisms for improving the user experience for time-dependent thin-stream applicationsAndreas Petlund, Kristian Evensen, Carsten Griwodz, Pål Halvorsen. 176-183 [doi]
- An analysis on error servers for stochastic network calculusJing Xie, Yuming Jiang. 184-191 [doi]
- Signal strength sensitivity and its effects on routing in maritime wireless networksChee-Wei Ang, Su Wen. 192-199 [doi]
- A new approach for network vulnerability analysisHai L. Vu, Kenneth K. Khaw, Tsong Yueh Chen, Fei-Ching Kuo. 200-206 [doi]
- On the application of anomaly detection in Reliable Server Pooling systems for improved robustness against denial of service attacksPascal Schottle, Thomas Dreibholz, Erwin P. Rathgeb. 207-214 [doi]
- Covert channels in multiplayer first person shooter online gamesSebastian Zander, Grenville J. Armitage, Philip Branch. 215-222 [doi]
- Decision process for automated selection of security protocolsLars Völker, Christoph Werle, Martina Zitterbart. 223-229 [doi]
- Implementation and performance evaluation of Selective Repeat ARQ for WiMAX NS-2 modelMichael Hempel, Wei Wang 0015, Hamid Sharif, Ting Zhou, Puttipong Mahasukhon. 230-235 [doi]
- Evaluation and parameterization of voice traffic models for disaster area scenariosNils Aschenbruck, Peter Martini. 236-243 [doi]
- Performance evaluation of optimal sized cluster based wireless sensor networks with correlated data aggregation considerationFan Bai, Abbas Jamalipour. 244-251 [doi]
- Reliability of wireless sensor gridsHosam M. F. AboElFotoh, Ehab S. Elmallah. 252-257 [doi]
- Monitoring the spatial-temporal effect of internet traffic based on Random Matrix TheoryJia Liu, Wenzhu Zhang, Jian Yuan, Depeng Jin, Lieguang Zeng. 258-265 [doi]
- Optimal distance-based clustering for tag anti-collision in RFID systemsWaleed Alsalih, Kashif Ali, Hossam S. Hassanein. 266-273 [doi]
- A hybrid MAC with prioritization for wireless sensor networksInes Slama, Bharat Shrestha, Badii Jouaber, Djamal Zeghlache. 274-281 [doi]
- Real-time performance analysis of Adaptive Link RateBaoke Zhang, Karthik Sabhanatarajan, Ann Gordon-Ross, Alan D. George. 282-288 [doi]
- A medium access control protocol for UWB sensor networks with QoS supportJicong Tan, Mun Choon Chan, Hwee-Xian Tan, Peng Yong Kong, Chen-Khong Tham. 289-296 [doi]
- Modeling of two-flow interactions under SINR model in Multi-hop Wireless NetworksSaquib Razak, Nael B. Abu-Ghazaleh, Vinay Kolar. 297-304 [doi]
- Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networksJunhai Luo, Xue Liu, Yi Zhang, Danxia Ye, Zhong Xu. 305-311 [doi]
- IPclip: An architecture to restore Trust-by-Wire in packet-switched networksHarald Widiger, Stephan Kubisch, Peter Danielis, Jens Schulz, Dirk Timmermann, Thomas Bahls, Daniel Duchow. 312-319 [doi]
- The design of a secure key management system for mobile ad hoc networksAzzedine Boukerche, Yonglin Ren. 320-327 [doi]
- Key management in wireless sensor networks with inter-network sensor roamingS. Choi, V. Sarangan, S. Trost. 328-335 [doi]
- Avoidance of multicast incapable branching nodes for multicast routing in WDM networksFen Zhou, Miklós Molnár, Bernard Cousin. 336-344 [doi]
- Cost-efficient backup-plane architecture for single-hop WDM networkNoriaki Kamiyama. 345-352 [doi]
- Routing and buffer placement optimization in optical burst switched networksJorge C. S. Castro, Joao M. F. Pedro, Paulo P. Monteiro. 353-360 [doi]
- Multi-criteria p-cycle network designHamza Drid, Bernard Cousin, Samer Lahoud, Miklos Molnór. 361-366 [doi]
- Towards a zero configuration authentication scheme for 802.11 based networksCarolin Latze, Ulrich Ultes-Nitsche, Florian Baumgartner. 367-373 [doi]
- WBest: A bandwidth estimation tool for IEEE 802.11 wireless networksMingzhe Li, Mark Claypool, Robert E. Kinicki. 374-381 [doi]
- A time multiplexing coordination mechanism on top of the IEEE 802.11 MAC layerAlexander Leonovich, Huei-Wen Ferng. 382-387 [doi]
- QoE-based network selection for multimedia users in IEEE 802.11 wireless networksKandaraj Piamrat, Adlen Ksentini, César Viho, Jean-Marie Bonnin. 388-394 [doi]
- On supporting handoff management for multi-source video streaming in mobile communication systemsTarik Taleb, Tomoyuki Nakamura, Kazuo Hashimoto. 395-402 [doi]
- Intelligent Mobility Support for IPv6Shengling Wang, Yong Cui, Sajal K. Das. 403-410 [doi]
- Receiver access control and secured handoff in mobile multicast using IGMP-ACSalekul Islam, J. William Atwood. 411-418 [doi]
- A client-based vertical handoff approach for seamless mobility in next generation wireless networksYong-Sung Kim, Dong-Hee Kwon, Young-Joo Suh. 419-426 [doi]
- A collaborative peer-to-peer architecture to defend against DDoS attacksRadwane Saad, Farid Naït-Abdesselam, Ahmed Serhrouchni. 427-434 [doi]
- Supporting geographical queries onto DHTsJordi Pujol Ahulló, Pedro García López, Marc Sánchez Artigas, Antonio F. Gómez-Skarmeta. 435-442 [doi]
- Supporting a seamless map in peer-to-peer system for Massively Multiplayer Online Role Playing GamesXinbo Jiang, Farzad Safaei. 443-450 [doi]
- A loosely synchronized gossip-based algorithm for aggregate information computationDongsheng Peng, Weidong Liu, Chuang Lin, Zhen Chen, Jiaxing Song. 451-455 [doi]
- An ant based rate allocation algorithm for media streaming in peer to peer networksAmir Hesam Salavati, Hadi Goudarzi, Mohammad Reza Pakravan. 456-463 [doi]
- Distributed and scalable control plane for next generation routers: A case study of OSPFKim Khoa Nguyen, Brigitte Jaumard. 464-471 [doi]
- Online control techniques for optimal management of bandwidth over shared infrastructure networksKaliappa Nadar Ravindran, Mohammad Rabby. 472-477 [doi]
- Optimized resource allocation for the uplink of SFBC-CDMA systemsTaimour Aldalgamouni, Ahmed K. Elhakeem. 478-483 [doi]
- Efficient bandwidth management in Broadband Wireless Access Systems using CAC-based dynamic pricingBader Al-Manthari, Nidal Nasser, Najah A. Abu Ali, Hossam S. Hassanein. 484-491 [doi]
- Smart Spanning Tree Bridging for Metro EthernetsAref Meddeb. 492-499 [doi]
- A distributed mobility management scheme for large-scale Mobile NetworksKeita Kawano, Kazuhiko Kinoshita, Nariyoshi Yamai. 500-501 [doi]
- Resource assignment for adaptively modulated interconnected WLANsAmiotosh Ghosh, Ahmed K. Elhakeem. 502-503 [doi]
- Analysis and evaluation of a scalable QoS device for broadband access to multimedia servicesWenyu Zhu, Thomas Dreibholz, Erwin P. Rathgeb. 504-505 [doi]
- P2P directory search: Signature Array Hash TableMiguel Jimeno, Kenneth J. Christensen. 506-508 [doi]
- Managing energy use in a network with a new SNMP Power State MIBFrancisco Blanquicet, Kenneth J. Christensen. 509-511 [doi]
- Channel assignment and scheduling in multichannel wireless sensor networksYuanyuan Zeng, Naixue Xiong, Tai-Hoon Kim. 512-513 [doi]
- Graph theory based aggregation of sensor readings in wireless sensor networksTatiana Bokareva, Nirupama Bulusu, Sanjay Jha. 514-515 [doi]
- Probabilistic packet dropping for load control in multihop wireless networksDaewon Jung, Hyuk Lim. 516-517 [doi]
- Reputation based trust management using TCG in Mobile Ad-Hoc Networks (RTA)Segla Kpodjedo, Samuel Pierre, Makan Pourzandi. 518-519 [doi]
- Cross-Layer analysis and enhancement of fast MIPv6 in the real IEEE 802.11 based WLANsYilin Song, Yi Sun. 520-521 [doi]
- TCP computational energy cost within wireless Mobile Ad Hoc NetworkAlaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mohammed Senouci. 522-524 [doi]
- Mitigate DDoS attack using TTL buckets and host threatening indexXi Chen, Gaogang Xie, Jianhua Yang. 525-526 [doi]
- On selfish behavior using asymmetric carrier sensing in IEEE 802.11 wireless networksEunho Yang, Jaehyuk Choi, Sunglim Lee. 527-529 [doi]
- End-to-end diagnosis of QoS violations with neural networkLiFeng Zhou, Lei Chen, Hung Keng Pung, Lek Heng Ngoh. 530-531 [doi]
- A cross-domain framework for coordinated end-to-end QoS adaptationLiFeng Zhou, Hung Keng Pung, Lek Heng Ngoh. 532-533 [doi]
- A CGAbased IP source address authentication method in IPv6 access networkGuang Yao, Jun Bi. 534-535 [doi]
- Performance of opportunistic scheduling schemes for MIMO-OFDM wireless LANsMikael Gidlund, Per Ahag. 536-537 [doi]
- A graph theoretic approach in achieving robust peer-to-peer networking paradigmH. Shafiei, F. Hoseini, Ahmad Khonsari, Mohamed Ould-Khaoua. 538-539 [doi]
- Queue-based contention control for congested multihop wireless networksJaeseon Hwang, Hyuk Lim. 540-541 [doi]
- Self-adjusting scheme for high speed routersNizar Ben Neji, Adel Bouhoula. 542-543 [doi]
- Optimizing router locations for minimum-energy wireless networksSungsoon Cho, John P. Hayes. 544-546 [doi]
- TabooQMR: A Taboo-based search algorithm improving Mamcra for multicast routingAdel Ben Mnaouer, Abdelfattah Belghith, Naouel Ben Ali, Miklós Molnár. 547-549 [doi]
- Short-term QoS provisioning in MPLS ingress nodesMasoomeh Torabzadeh, Wessam Ajib. 550-552 [doi]
- A forwarding protocol with relay acknowledgement for vehicular ad-hoc networksInhyeok Jang, Wooyeol Choi, Hyuk Lim. 553-554 [doi]
- Connectivity-driven flow recovery for time-sensitive transport servicesMichio Honda, Jin Nakazawa, Yoshifumi Nishida, Hideyuki Tokuda. 555-556 [doi]
- A proactive secure routing algorithm defense against node compromise in sensor networksXiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou, Zhihua Liu. 557-559 [doi]
- Two dynamic restoration schemes for survivable traffic grooming in WDM networksHuaxiong Yao, Yan Yang, Zongkai Yang. 560-561 [doi]
- Distributed channel assignment in Wireless Mesh Networks with guaranteed connectivitySuleyman Uludag, Kemal Akkaya. 562-563 [doi]
- A Tag Prediction Algorithm using Upper Bit in RFID systemsSung-Soo Kim, Yong Hwan Kim, Seong Joon Lee, Kyung Ho Chung, Kwang Seon Ahn. 564-565 [doi]
- Hybrid role hierarchy for the extended role based access control modelZhenxing Luo, Jing Chen, Zuoquan Lin. 566-567 [doi]
- Performance measurement and queueing analysis of medium-high blocking probability of two and three parallel connection serversChung-Ping Chen, Ying-Wen Bai, Yin-Sheng Lee. 568-569 [doi]
- Spatially Disjoint Multipath Routing protocol without location informationJuan Jose Galvez, Pedro M. Ruiz, Antonio F. Gómez-Skarmeta. 570-571 [doi]
- Video streaming with network coding and opportunistic relay in wireless mesh networksBoubacar Kimba, Dit Adamou, Shihong Zou, Shiduan Cheng. 572-573 [doi]
- An efficient anti-collision algorithm through division transfer of tag ID in RFID systemsSeong Joon Lee, Young-Tae Kim, Sung-Soo Kim, Yong Soo Park, Yong Hwan Kim, Kwang Seon Ahn. 574-575 [doi]
- Quality of service support in wireless local area network with error control protocolAbdelsalam B. Amer, Fayez Gebali, Y. Abdel-Hamid. 576-578 [doi]
- Analysis of proxy MIPv6 performance compared to fast MIPv6Ali Diab, Andreas Mitschele-Thiel, Kalin Getov, Oliver Blume. 579-580 [doi]
- Interconnecting MANET and the internet a mobility approachFrancisco David Trujillo, Alicia Triviño-Cabrera, Eduardo Casilari-Pérez, Antonio Díaz Estrella, Antonio J. Yuste. 581-582 [doi]
- Innovative approach for improving access to wireless services in high occupancy vehiclesBenjamin Falchuk, Ming Lai. 585-592 [doi]
- Mobility management for highly mobile users and vehicular networks in heterogeneous environmentsKarl Andersson, Christer Åhlund, Balkrishna Sharma Gukhool, Soumaya Cherkaoui. 593-599 [doi]
- Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networksChristine Laurendeau, Michel Barbeau. 600-607 [doi]
- IP address configuration in VANET using centralized DHCPBrijesh Kadri Mohandas, Ramiro Liscano. 608-613 [doi]
- Supporting real-time data traffic in safety-critical vehicle-to-infrastructure communicationAnnette Böhm, Magnus Jonsson. 614-621 [doi]
- IEEE 802.11p modeling in NS-2Balkrishna Sharma Gukhool, Soumaya Cherkaoui. 622-626 [doi]
- Service outsourcing to support virtual home environments (VHE)Vitalis G. Ozianyi, Neco Ventura. 629-633 [doi]
- Achieving host mobility using DNS dynamic updating protocolBashir Yahya, Jalel Ben-Othman. 634-638 [doi]
- Energy-efficient transmission scheme of JPEG images over Visual Sensor NetworksAbdelhamid Mammeri, Ahmed Khoumsi, Djemel Ziou, Brahim Hadjou. 639-647 [doi]
- A proactive distance-based flooding technique for MANETs with heterogeneous radio rangesAbdulla Al-Qawasmeh, Saïd Bettayeb. 648-654 [doi]
- Scheduling optimization in multiuser detection based MAC design for Ad-Hoc networksM. Bouharras, Zbigniew Dziong, François Gagnon, M. Haider. 655-660 [doi]
- QoS provisioning in WCDMA cellular networks through rate and coverage adaptationKhaled A. Ali, Hossam S. Hassanein, Hussein T. Mouftah. 661-666 [doi]
- Knowledge discovery in Wireless Sensor Networks for Chronological PatternsAzzedine Boukerche, Samer Samarah, Hani Harbi. 667-673 [doi]
- Performance analysis of an admission control enhancement in WIMAX networks using SANLynda Mokdad, Jalel Ben-Othman. 674-679 [doi]
- Performance of IEEE 802.15.4 in wireless sensor networks with a mobile sink implementing various mobility strategiesDusan Stevanovic, Natalija Vlajic. 680-688 [doi]
- Utilizing IEEE 802.11n to enhance QoS support in wireless mesh networksAbduladhim Ashtaiwi, Hossam S. Hassanein. 689-696 [doi]
- A performance evaluation of OLSR and AODV routing protocols using a self-configuration mechanism for heterogeneous wireless mesh networksAzzedine Boukerche, Lucas Guardalben, João Bosco M. Sobral, Mirela Sechi Moretti Annoni Notare. 697-704 [doi]
- Beasties: Simple wireless sensor nodesAsher Hoskins, Julie A. McCann. 707-714 [doi]
- Designing a sensor network testbed for smart heterogeneous applicationsAndreas Reinhardt, Matthias Kropff, Matthias Hollick, Ralf Steinmetz. 715-722 [doi]
- An experimental analysis of Zigbee networksE. Dalila Pinedo-Frausto, J. Antonio García-Macías. 723-729 [doi]
- Demonstration of bird species detection using an acoustic wireless sensor networkDarren Moore. 730-731 [doi]
- Priority interrupts of Duty Cycled communications in wireless sensor networksTony O Donovan, Jonathan P. Benson, Utz Roedig, Cormac J. Sreenan. 732-739 [doi]
- An efficient service oriented architecture for heterogeneous and dynamic wireless sensor networksJeremie Leguay, Mario Lopez-Ramos, Kathlyn Jean-Marie, Vania Conan. 740-747 [doi]
- A service-differentiated real-time communication scheme for wireless sensor networksYuyan Xue, Byrav Ramamurthy, Mehmet C. Vuran. 748-755 [doi]
- What s new? Message reduction in sensor networks using eventsAndreas Köpke, Adam Wolisz. 756-761 [doi]
- Design and implementation of a policy-based management system for data reliability in Wireless Sensor NetworksTuan D. Le, Wen Hu, Sanjay Jha, Peter Corke. 762-769 [doi]
- Firewalling wireless sensor networks: Security by wirelessIvan Martinovic, Nicos Gollan, Jens B. Schmitt. 770-777 [doi]
- In-network-aggregation as case study for a support tool reducing the complexity of designing secure wireless sensor networksSteffen Peter, Krzysztof Piotrowski, Peter Langendörfer. 778-785 [doi]
- Key pre-distribution based secure backbone formation in wireless sensor networksH. M. N. Dilum Bandara, Anura P. Jayasumana, Indrajit Ray. 786-793 [doi]
- Q-learning based collaborative load balancing using distributed search for unstructured P2P networksSabu M. Thampi, K. Chandra Sekaran. 797-802 [doi]
- Opportunistic Wireless Broadcast (OWB): Dynamic redundancy detection in the wireless mediumDavid Salyers, Aaron Striegel, Christian Poellabauer. 803-810 [doi]
- An evaluation method for delay time and its jitter of WLAN using a GSPN modelMasahiro Tsunoyama, Hiroei Imai. 811-812 [doi]
- Understanding and using mobility on Publish/Subscribe based architectures for MANETsCristiano G. Rezende, Azzedine Boukerche, Bruno P. S. Rocha, Antonio Alfredo Ferreira Loureiro. 813-820 [doi]
- Real-time routing for mobile sensor/actor networksAravind R. Sama, Kemal Akkaya. 821-828 [doi]
- On handling weakened topologies of Wireless Sensor NetworksMohamed Younis, Qiao Pan. 829-835 [doi]
- Design and implementation of a generic hybrid wireless sensor network platformE. Pamba Capo-Chichi, Hervé Guyennet, Jean-Michel Friedt, Ian Johnson, Craig Duffy. 836-840 [doi]
- A weighted RED for alleviating starvation problem in wireless mesh networksChaegwon Lim, Chong-Ho Choi, Hyuk Lim. 841-842 [doi]
- A performance study of scheduling algorithms in Point-to-Multipoint WiMAX networksPratik Dhrona, Najah A. Abu Ali, Hossam S. Hassanein. 843-850 [doi]
- CDMA/MPLS platforms for WIMAX mesh networksImam Al-wazedi, Ahmed K. Elhakeem. 851-858 [doi]
- On measuring available bandwidth in wireless networksAndreas Johnsson, Mats Björkman. 861-868 [doi]
- Evaluating no-new-wires home networksYeting Yu, Jianping Pan, Ming Lu, Lin Cai, Daniel Hoffman. 869-875 [doi]
- Detecting changes in the Hurst parameterShubhankar Chatterjee, Mike H. MacGregor, Stephen Bates. 876-883 [doi]
- Accurate real-time monitoring of bottlenecks and performance of packet trace collectionJavier Rubio-Loyola, Dolors Sala, Ali Ismail Ali. 884-891 [doi]
- Speedo: Realistic achievable bandwidth in 802.11 through passive monitoringMalik Ahmad Yar Khan, Darryl Veitch. 892-899 [doi]
- Modeling of multi-resolution active network measurement time-seriesPrasad Calyam, Ananth Devulapalli. 900-907 [doi]
- Detection of anomalous network packets using lightweight stateless payload inspectionNnamdi Nwanze, Douglas Summerville. 911-918 [doi]
- A two-stage aggregation/thresholding scheme for multi-model anomaly-based approachesKarim Tabia, Salem Benferhat, Yassine Djouadi. 919-926 [doi]
- Real-time intrusion prevention and security analysis of networks using HMMsKjetil Haslum, Marie Elisabeth Gaup Moe, Svein J. Knapskog. 927-934 [doi]
- Identification of malicious web pages through analysis of underlying DNS and web server relationshipsChristian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky. 935-941 [doi]
- Effect of intrusion detection on secure group communications in hierarchically structured group architecturesJin-Hee Cho, Ing-Ray Chen. 942-949 [doi]
- Event-B based invariant checking of secrecy in group key protocolsAmjad Gawanmeh, Sofiène Tahar, Leila Jemni Ben Ayed. 950-957 [doi]
- Key revocation based on Dirichlet multinomial model for mobile ad hoc networksXinxin Fan, Guang Gong. 958-965 [doi]
- Secure and efficient authentication in Wireless Mesh Networks using merkle treesLakshmi Santhanam, Bin Xie, Dharma P. Agrawal. 966-972 [doi]