Abstract is missing.
- Misbehavior detection and isolation in peer-to-peer networks with the presence of hidden nodesJoseph Soryal, Xijie Liu, Tarek N. Saadawi. 1-4 [doi]
- Countermeasure for intelligent cluster-head jamming attack in wireless sensor networkSachin Dilip Babar, Neeli R. Prasad, Ramjee Prasad. 1-8 [doi]
- Empirical performance analysis of anonymizing VoIP over The Onion Router (TOR) networkMaimun Rizal, Somayeh Taheri, Dieter Hogrefe. 1-4 [doi]
- UnLocIn: Unauthorized location inference on smartphones without being caughtLe T. Nguyen, Yuan Tian, Sungho Cho, Wookjong Kwak, S. Parab, Yu Seung Kim, Patrick Tague, Joy Zhang. 1-8 [doi]
- Secure mobile authentication and device association with enhanced cryptographic enginesMatthew Areno, James F. Plusquellic. 1-8 [doi]
- The SITA principle for location privacy - Conceptual model and architectureMads Schaarup Andersen, Mikkel Baun Kjærgaard, Kaj Grønbæk. 1-8 [doi]
- Beyond the thin client model for location privacyRinku Dewri, Wisam Eltarjaman, Prasad Annadata, Ramakrishna Thurimella. 1-8 [doi]
- Mobile client-side personalizationMuhammad Asif, John Krogstie. 1-4 [doi]
- Security for smart mobile networks: The NEMESYS approachErol Gelenbe, Gökçe Görbil, Dimitrios Tzovaras, Steffen Liebergeld, David Garcia, Madalina Baltatu, George L. Lyberopoulos. 1-8 [doi]
- SAFE: Secure authentication with Face and EyesArman Boehm, Dongqu Chen, Mario Frank, Ling Huang, Cynthia Kuo, Tihomir Lolic, Ivan Martinovic, Dawn Song. 1-8 [doi]
- SecureDroid: An Android security framework extension for context-aware policy enforcementValerio Arena, Vincenzo Catania, Giuseppe La Torre, Salvatore Monteleone, Fabio Ricciato. 1-8 [doi]