Abstract is missing.
- On Trust Evaluation in Mobile Ad Hoc NetworksDang-Quan Nguyen, Louise Lamont, Peter C. Mason. 1-13 [doi]
- A Distributed Data Storage Scheme for Sensor NetworksAbhishek Parakh, Subhash Kak. 14-22 [doi]
- A Rich Client-Server Based Framework for Convenient Security and Management of Mobile ApplicationsStephen Badan, Julien Probst, Markus Jaton, Damien Vionnet, Jean-Frédéric Wagen, Gérald Litzistorf. 23-34 [doi]
- A Robust Conditional Privacy-Preserving Authentication Protocol in VANETChae Duk Jung, Chul Sur, Youngho Park, Kyung Hyune Rhee. 35-45 [doi]
- An Autonomous Attestation Token to Secure Mobile Agents in Disaster ResponseDaniel M. Hein, Ronald Toegl. 46-57 [doi]
- An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key SystemQingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian. 58-70 [doi]
- Building Efficient Integrity Measurement and Attestation for Mobile Phone PlatformsXinwen Zhang, Onur Aciiçmez, Jean-Pierre Seifert. 71-82 [doi]
- Context-Aware Monitoring of Untrusted Mobile ApplicationsAndrew Brown, Mark Ryan. 83-96 [doi]
- Extending the Belgian eID Technology with Mobile Security FunctionalityJorn Lapon, Bram Verdegem, Pieter Verhaeghe, Vincent Naessens, Bart De Decker. 97-109 [doi]
- Filtering SPAM in P2PSIP Communities with Web of TrustJuho Heikkilä, Andrei Gurtov. 110-121 [doi]
- Generating Random and Pseudorandom Sequences in Mobile DevicesJan Krhovjak, Vashek Matyas, Jiri Zizkovsky. 122-133 [doi]
- A Context-Aware Security Framework for Next Generation Mobile NetworksMatteo Bandinelli, Federica Paganelli, Gianluca Vannuccini, Dino Giuli. 134-147 [doi]
- Information Reconciliation Using Reliability in Secret Key Agreement Scheme with ESPAR AntennaTakayuki Shimizu, Hisato Iwai, Hideichi Sasaoka. 148-159 [doi]
- Protecting Privacy and Securing the Gathering of Location Proofs - The Secure Location Verification Proof Gathering ProtocolMichelle Graham, David Gray. 160-171 [doi]
- Providing Strong Security and High Privacy in Low-Cost RFID NetworksMathieu David, Neeli R. Prasad. 172-179 [doi]
- Safe, Fault Tolerant and Capture-Resilient Environmental Parameters Survey Using WSNsGianni Fenu, Gary Steri. 180-189 [doi]
- SAVAH: Source Address Validation with Host Identity Protocol Dmitriy Kuptsov, Andrei Gurtov. 190-201 [doi]
- Secure Service Invocation in a Peer-to-Peer Environment Using JXTA-SOAPMaria Chiara Laghi, Michele Amoretti, Gianni Conte. 202-213 [doi]
- Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network ApplicationsMike Meyerstein, Inhyok Cha, Yogendra Shah. 214-225 [doi]
- Simple Peer-to-Peer SIP PrivacyJoakim Koskela, Sasu Tarkoma. 226-237 [doi]
- On Modeling Viral Diffusion in Heterogeneous Wireless Networks Hoai-Nam Nguyen, Yoichi Shinoda. 238-252 [doi]
- Mobile WiMAX Network SecurityRainer Falk, Christian Günther, Dirk Kröselberg, Avi Lior. 253-264 [doi]
- LoPSiL: A Location-Based Policy-Specification LanguageJay Ligatti, Billy Rickey, Nalin Saigal. 265-277 [doi]
- Impersonation Attacks on a Mobile Security Protocol for End-to-End CommunicationsReiner Dojen, Vladimir Pasca, Tom Coffey. 278-287 [doi]