Abstract is missing.
- A Closed-Form Expression for Outage Secrecy Capacity in Wireless Information-Theoretic SecurityTheofilos Chrysikos, Tasos Dagiuklas, Stavros Kotsopoulos. 3-12 [doi]
- Enhanced Access Polynomial Based Self-healing Key DistributionRatna Dutta, Sourav Mukhopadhyay, Tom Dowling. 13-24 [doi]
- Security Flaws in an Efficient Pseudo-Random Number Generator for Low-Power EnvironmentsPedro Peris-Lopez, Julio C. Hernandez-Castro, Juan M. Estévez-Tapiador, Enrique San Millán, Jan C. A. van der Lubbe. 25-35 [doi]
- RSSI-Based User Centric Anonymization for Location Privacy in Vehicular NetworksYu-Chih Wei, Yi-Ming Chen, Hwai-Ling Shan. 39-51 [doi]
- Integrating Wireless Sensor Networks with Computational GridsNikolaos Preve. 53-63 [doi]
- Security for Heterogeneous and Ubiquitous Environments Consisting of Resource-Limited Devices: An Approach to Authorization Using KerberosJasone Astorga, Jon Matías, Purificación Sáiz, Eduardo Jacob. 65-76 [doi]
- Signalprint-Based Intrusion Detection in Wireless NetworksRob Mitchell, Ing-Ray Chen, Mohamed Eltoweissy. 77-88 [doi]