Abstract is missing.
- The Effectiveness of Intersection Attack Countermeasures for Graphical PasswordsRosanne English, Ron Poet. 1-8  [doi]
 - Divide and Conquer: An Efficient Attack on Yahoo! CAPTCHAHaichang Gao, Wei Wang, Ye Fan. 9-16  [doi]
 - Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry ModeJohannes Barnickel, Jian Wang, Ulrike Meyer. 17-24  [doi]
 - Research on Time Synchronization and Flow Aggregation in LDDoS Attack Based on Cross-correlationZhijun Wu, Lan Ma, Minghua Wang, Meng Yue, Lu Wang. 25-32  [doi]
 - Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack DetectionZhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu. 33-40  [doi]
 - A Taxonomy of Trust and Reputation System AttacksDavid Fraga, Zorana Bankovic, José Manuel Moya. 41-50  [doi]
 - An Active Detection Mechanism for Detecting ICMP Based AttacksFerdous A. Barbhuiya, S. Roopa, Ritesh Ratti, Santosh Biswas, Sukumar Nandi. 51-58  [doi]
 - Robust Biometric Based Key Agreement and Remote Mutual AuthenticationHisham Al-Assam, Sabah Jassim. 59-65  [doi]
 - A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint AuthenticationWenCheng Yang, Jiankun Hu, Song Wang. 66-70  [doi]
 - RFID Mutual Authentication and Secret Update Protocol for Low-Cost TagsMohamed A. Sharaf. 71-77  [doi]
 - A Hybrid Authentication and Key Establishment Scheme for WBANWassim Drira, Éric Renault, Djamal Zeghlache. 78-83  [doi]
 - Towards a Formal Verification of a Multi-factor Authentication Protocol Using Automated Theorem ProversEduardo dos Santos, Jean Everson Martina, Ricardo Felipe Custódio. 84-91  [doi]
 - Data Integration in Presence of Authorization PoliciesMehdi Haddad, Mohand-Said Hacid, Robert Laurini. 92-99  [doi]
 - Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud ComputingQiwei Lu, Yan Xiong, Xudong Gong, Wenchao Huang. 100-108  [doi]
 - Fusion of Opinions under Uncertainty and Conflict - Application to Trust Assessment for Cloud MarketplacesSheikh Mahbub Habib, Sebastian Ries, Sascha Hauke, Max Mühlhäuser. 109-118  [doi]
 - TSD: A Flexible Root of Trust for the CloudDexian Chang, XiaoBo Chu, Yu Qin, Dengguo Feng. 119-126  [doi]
 - Clouds Trust AnchorsImad M. Abbadi. 127-136  [doi]
 - Tracking of Data Leaving the CloudYu Shyang Tan, Ryan K. L. Ko, Peter Jagadpramana, Chun Hui Suen, Markus Kirchberg, Teck Hooi Lim, Bu-Sung Lee, Anurag Singla, Ken Mermoud, Doron Keller, Ha Duc. 137-144  [doi]
 - TREASURE: Trust Enhanced Security for Cloud EnvironmentsVijay Varadharajan, Udaya Kiran Tupakula. 145-152  [doi]
 - Confidentiality as a Service - Usable Security for the CloudSascha Fahl, Marian Harbach, Thomas Muders, Matthew Smith. 153-162  [doi]
 - Constructing a Cloud-Based IDS by Merging VMI with FMAChristopher Harrison, Devin Cook, Robert McGraw, John A. Hamilton Jr.. 163-169  [doi]
 - AnonymousCloud: A Data Ownership Privacy Provider Framework in Cloud ComputingSafwan Mahmud Khan, Kevin W. Hamlen. 170-176  [doi]
 - Virtual Property Theft Detection Framework: An Algorithm to Detect Virtual Propety Theft in Virtual World EnvironmentsNicholas Charles Patterson, Michael Hobbs, Jemal H. Abawajy. 177-184  [doi]
 - Efficient Missing Tag Detection in a Large RFID SystemCunqing Ma, Jingqiang Lin, Yuewu Wang. 185-192  [doi]
 - Cheater Detection in Vehicular NetworksDijiang Huang, Sean A. Williams, Swaroop Shere. 193-200  [doi]
 - A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate ArraysQuang-Anh Tran, Frank Jiang, Jiankun Hu. 201-208  [doi]
 - A Practical Network-Based Intrusion Detection and Prevention SystemNaruemon Wattanapongsakorn, S. Srakaew, E. Wonghirunsombat, C. Sribavonmongkol, T. Junhom, P. Jongsubsook, Chalermpol Charnsripinyo. 209-214  [doi]
 - VicSifter: A Collaborative DDoS Detection System with Lightweight Victim IdentificationFei Wang 0007, Xiaofeng Wang, Jinshu Su, Bin Xiao. 215-222  [doi]
 - Adaptive Character Frequency-Based Exclusive Signature Matching Scheme in Distributed Intrusion Detection EnvironmentYuxin Meng, Wenjuan Li. 223-230  [doi]
 - An Efficient Cross-Layer Approach for Malicious Packet Dropping Detection in MANETsLeovigildo Sánchez-Casado, Gabriel Maciá-Fernández, Pedro Garcia-Teodoro. 231-238  [doi]
 - A Multivariate Classification Algorithm for Malicious Node Detection in Large-Scale WSNsHongjun Dai, Huabo Liu, Zhiping Jia, Tianzhou Chen. 239-245  [doi]
 - Detecting Imprudence of 'Reliable' Sellers in Online Auction SitesXin Liu, Anwitaman Datta, Hui Fang, Jie Zhang. 246-253  [doi]
 - A Novel Scoring Model to Detect Potential Malicious Web PagesVan Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk. 254-263  [doi]
 - Real-Time Diagnosis of Network Anomaly Based on Statistical Traffic AnalysisLei (Chris) Liu, Xiaolong Jin, Geyong Min, Li Xu. 264-270  [doi]
 - Provably Secure Single Sign-on Scheme in Distributed Systems and NetworksJiangshan Yu, Guilin Wang, Yi Mu. 271-278  [doi]
 - Secure Distributed Solution for Optimal Energy Consumption Scheduling in Smart GridMohammad Ashiqur Rahman, Libin Bai, Mohamed Shehab, Ehab Al-Shaer. 279-286  [doi]
 - Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer NetworkGuanghai Cui, MingChu Li, Zhen Wang, Linlin Tian, Jianhua Ma. 287-294  [doi]
 - Efficient and Provably-Secure Group Key Management Scheme Using Key DerivationYi-Ruei Chen, Wen-Guey Tzeng. 295-302  [doi]
 - Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETsYuanbo Guo, Jianfeng Ma, Chao Wang, Liang-min Wang. 303-309  [doi]
 - A Secure Distributed File System Based on Revised Blakley's Secret Sharing SchemeSu Chen, Yi Chen 0001, Hai Jiang, Laurence Tianruo Yang, Kuan-Ching Li. 310-317  [doi]
 - Efficient Contextual Transaction Trust Computation in E-commerce EnvironmentsHaibin Zhang, Yan Wang, Xiuzhen Zhang. 318-325  [doi]
 - Building Robust Reputation Systems in the E-commerce EnvironmentHuiying Duan, Feifei Liu. 326-333  [doi]
 - Feedback as "Shadow of the Present": An Alternative to Reputation Systems for E-marketplacesQin Li, Jie Zhang, Keith M. Martin. 334-341  [doi]
 - Security Attribute Aggregation Models for E-research CollaborationsRichard O. Sinnott, Christopher Bayliss, Gerson Galang, Damien Mannix, Martin Tomko. 342-349  [doi]
 - Determining the Optimal Reporting Strategy in Competitive E-marketplacesZeinab Noorian, Jie Zhang, Michael Fleming, Stephen Marsh. 350-357  [doi]
 - K-Anonymous Cloaking Algorithm Based on Weighted Adjacency Graph for Preserving Location PrivacyAmina Hossain, Al-Amin Hossain, Sung-Jae Jang, Young-Sung Shin, Jae-Woo Chang. 358-365  [doi]
 - Measuring Anonymity by Profiling Probability DistributionsRajiv Bagai, Nan Jiang. 366-374  [doi]
 - How Practical is Homomorphically Encrypted Program Execution? An Implementation and Performance EvaluationMichael Brenner, Henning Perl, Matthew Smith. 375-382  [doi]
 - A Privacy Preserving Application Acquisition ProtocolRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 383-392  [doi]
 - An Efficient Trust Management System for Balancing the Safety and Location Privacy in VANETsYu-Chih Wei, Yi-Ming Chen. 393-400  [doi]
 - Reputation Diffusion Simulation for Avoiding Privacy ViolationDavid Pergament, Armen Aghasaryan, Jean-Gabriel Ganascia. 401-408  [doi]
 - Ring Group SignaturesLiqun Chen. 409-418  [doi]
 - GridPriv: A Smart Metering Architecture Offering k-AnonymityMark Stegelmann, Dogan Kesdogan. 419-426  [doi]
 - Anonymity and Transferability for an Electronic Bank Check SchemeM. Francisca Hinarejos, Josep Lluís Ferrer-Gomila, Gerard Draper-Gil, Llorenç Huguet i Rotger. 427-435  [doi]
 - Evaluating the Optimized Implementations of SNOW3G and ZUC on FPGALingchen Zhang, Luning Xia, Zongbin Liu, Jiwu Jing, Yuan Ma. 436-442  [doi]
 - Sufficient Encryption with Codewords and Bin-strings of H.264/SVCMamoona Naveed Asghar, Mohammad Ghanbari, Martin J. Reed. 443-450  [doi]
 - Anonymous Networking Meets Real-World Business RequirementsMark Vinkovits, Erion Elmasllari, Claudio Pastrone. 451-457  [doi]
 - Subversion Impedance in Covert Communication NetworksTimothy Nix, Riccardo Bettati. 458-465  [doi]
 - Simulatable Oblivious Transfer Protocols Based on Blind SignatureJ. Qin, J. Hu, H. Zhao. 466-473  [doi]
 - Ginger: An Access Control Framework for Telematics ApplicationsDavid Herges, Naim Asaj, Bastian Könings, Florian Schaub, Michael Weber 0001. 474-481  [doi]
 - Overhauling of a ASEA Robot IR6 with Open ArchitectureM. H. S. Bomfim, R. A. Gontijo, Alexandre Queiroz Bracarense, Eduardo Jose Lima II. 482-489  [doi]
 - Classification of Correlated Internet Traffic FlowsJun Zhang, Chao Chen, Yang Xiang, Wanlei Zhou. 490-496  [doi]
 - Cooperative Trajectory-Based Map ConstructionWei Chang, Jie Wu 0001, Chiu Chiang Tan. 497-504  [doi]
 - Messing with Android's Permission ModelAndre Egners, Ulrike Meyer, Björn Marschollek. 505-514  [doi]
 - Wire - A Formal Intermediate Language for Binary AnalysisSilvio Cesare, Yang Xiang. 515-524  [doi]
 - SEAMS: A Signaling Layer for End-Host-Assisted Middlebox ServicesRené Hummen, Jan Henrik Ziegeldorf, Tobias Heer, Hanno Wirtz, Klaus Wehrle. 525-532  [doi]
 - An Analytical Model on the Propagation of Modern Email WormsWei Zhou, Sheng Wen, Yini Wang, Yang Xiang, Wanlei Zhou. 533-540  [doi]
 - Analysis of SIP-Based Threats Using a VoIP Honeynet SystemDirk Hoffstadt, Alexander Marold, Erwin P. Rathgeb. 541-548  [doi]
 - Multiplayer Game Technology to Manage Critical Infrastructure ProtectionLaura Pla Beltran, Madjid Merabti, Qi Shi. 549-556  [doi]
 - FACIUS: An Easy-to-Deploy SAML-based Approach to Federate Non Web-Based ServicesJens Köhler, Sebastian Labitzke, Michael Simon, Martin Nussbaumer, Hannes Hartenstein. 557-564  [doi]
 - Provable Data Possession Using Sigma-protocolsAkshaya Mohan, Rajendra Katti. 565-572  [doi]
 - Towards Safe and Optimal Network Designs Based on Network Security RequirementsNihel Ben Youssef Ben Souayeh, Adel Bouhoula. 573-579  [doi]
 - Mechanism Design Based Secure Data Object ReplicationMinzhe Guo, Prabir Bhattacharya. 580-587  [doi]
 - HyperDomain: Enabling Inspection of Malicious VMM's MisbehaviorWenyin Yang, Li Ma. 588-595  [doi]
 - Image Resizing Based on Geometry Preservation with Seam CarvingFan Zhou, Ruomei Wang, Yu Liu, Yun Liang. 596-601  [doi]
 - An MCL-Based Approach for Spam Profile Detection in Online Social NetworksFaraz Ahmed, Muhammad Abulaish. 602-608  [doi]
 - Efficient Privacy Preserving Matchmaking for Mobile Social Networking against Malicious UsersYong Wang, Ting-ting Zhang, Hong-Zong Li, Long-Ping He, Jing Peng. 609-615  [doi]
 - IRIS: A Novel Method of Direct Trust Computation for Generating Trusted Social NetworksSana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia. 616-623  [doi]
 - Multiple QoT Constrained Social Trust Path Selection in Complex Social NetworksGuanfeng Liu, Yan Wang 0002, Duncan S. Wong. 624-631  [doi]
 - Effects of Social Characters in Viral Propagation Seeding Strategies in Online Social NetworksAlessio Bonti, Ming Li, Longxiang Gao, Wen Shi. 632-639  [doi]
 - Evaluating User Community Influence in Online Social NetworksZhengli Xiong, Wenjun Jiang, Guojun Wang. 640-647  [doi]
 - Optimal State Management of Data Sharing in Online Social Network (OSN) ServicesJoon S. Park, Sookyung Kim, Charles A. Kamhoua, Kevin A. Kwiat. 648-655  [doi]
 - A Distributed ECC-DSS Authentication Scheme Based on CRT-VSS and Trusted Computing in MANETQiwei Lu, Yan Xiong, Wenchao Huang, Xudong Gong, Fuyou Miao. 656-665  [doi]
 - Unwanted Traffic Control via Hybrid Trust ManagementZheng Yan, Raimo Kantola, Yue Shen. 666-673  [doi]
 - Offline RFID Grouping Proofs with Trusted TimestampsCunqing Ma, Jingqiang Lin, Yuewu Wang, Ming Shang. 674-681  [doi]
 - A Case Based Reasoning Framework for Improving the Trustworthiness of Digital Forensic InvestigationsGraeme Horsman, Christopher Laing, Paul Vickers. 682-689  [doi]
 - Confidence as a Means to Assess the Accuracy of Trust Values Rolf Kiefhaber, Gerrit Anders, Florian Siefert, Theo Ungerer, Wolfgang Reif. 690-697  [doi]
 - A Generalized Stereotypical Trust ModelHui Fang, Jie Zhang, Murat Sensoy, Nadia Magnenat-Thalmann. 698-705  [doi]
 - Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor NetworksHuawei Zhao, Jiankun Hu, Jing Qin, Vijay Varadharajan, Haishan Wan. 706-713  [doi]
 - Trusted Administration of Large-Scale Cryptographic Role-Based Access Control SystemsLan Zhou, Vijay Varadharajan, Michael Hitchens. 714-721  [doi]
 - A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed NetworksJoydeep Chandra, Ingo Scholtes, Niloy Ganguly, Frank Schweitzer. 722-729  [doi]
 - A New Efficient Property-Based Attestation Protocol Based on Elliptic CurvesXiaoBo Chu, Qin Yu. 730-736  [doi]
 - Reusable and Extensible Fault Tolerance for RESTful ApplicationsJohn Edstrom, Eli Tilevich. 737-744  [doi]
 - An Area-Based Approach for Node Replica Detection in Wireless Sensor NetworksWibhada Naruephiphat, Yusheng Ji, Chalermpol Charnsripinyo. 745-750  [doi]
 - Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor NetworksMiao Xie, Jiankun Hu, Biming Tian. 751-759  [doi]
 - Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake SourcesArshad Jhumka, Matthew Bradbury, Matthew Leeke. 760-768  [doi]
 - A Hybrid Key Management Protocol for Wireless Sensor NetworksMusfiq Rahman, Srinivas Sampalli. 769-776  [doi]
 - Secure Sector Based Bi-path Clustering and Routing Protocol for WSNsYihong Zang, Johnson P. Thomas, Gheorghita Ghinea, Mathews Thomas, Salaheddin Darwish. 777-784  [doi]
 - Modelling of Secure Data Transmission over a Multichannel Wireless Network in AlloyAliaa M. Alabdali, Lilia Georgieva, Greg Michaelson. 785-792  [doi]
 - Collaborative Traffic-Aware Intrusion Monitoring in Multi-channel Mesh NetworksQijun Gu, Wanyu Zang, Meng Yu, Peng Liu. 793-800  [doi]
 - Evaluation Criteria for Future Identity ManagementJesse Leskinen. 801-806  [doi]
 - Privacy-Preserving Statistical Analysis Method for Real-World DataJun Ishii, Hiroyuki Maeomichi, Ikuo Yoda. 807-812  [doi]
 - The Multi-layer Imbrication for Data Leakage Prevention from Mobile DevicesCharles Perez, Babiga Birregah, Marc Lemercier. 813-819  [doi]
 - Gemini: A Handbag for Pervasive Social CommunicationsYu Chen, Zheng Yan. 820-825  [doi]
 - Adaptive Trust Management Mechanism for Cognitive Radio NetworksQingqi Pei, Lei Li, Hongning Li, Beibei Yuan. 826-831  [doi]
 - An Identity Authentication Mechanism Based on Timing Covert ChannelYanan Sun, Xiaohong Guan, Ting Liu, Yu Qu. 832-836  [doi]
 - A Privacy Preserving Scalable Architecture for Collaborative Event CorrelationHani Qusa, Roberto Baldoni, Roberto Beraldi. 837-843  [doi]
 - Dynamic User Revocation and Key Refreshing for Attribute-Based Encryption in Cloud StorageZhiqian Xu, Keith M. Martin. 844-849  [doi]
 - Vulnerabilities through Usability Pitfalls in Cloud Services: Security Problems due to Unverified Email AddressesTobias Hahn, Thomas Kunz, Markus Schneider 0002, Sven Vowe. 850-856  [doi]
 - Insider Attacks in Cloud ComputingAdrian J. Duncan, Sadie Creese, Michael Goldsmith. 857-862  [doi]
 - Resources Collaborative Scheduling Model Based on Trust Mechanism in CloudKun Lu, Hua Jiang, MingChu Li, Sheng Zhao, Jianhua Ma. 863-868  [doi]
 - Security and Trust Preserving VM Migrations in Public CloudsMudassar Aslam, Christian Gehrmann, Mats Björkman. 869-876  [doi]
 - WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OSCaner Kilinc, Todd Booth, Karl Andersson. 877-883  [doi]
 - A Secure Node Localization Method Based on the Congruity of Time in Wireless Sensor NetworksYongzhao Zhan, Chunxia Li, Xinsheng Wang, Yuan Zhou, Lu Liu, Hussain Al-Aqrabi. 884-889  [doi]
 - A Rapid Certification Protocol from Bilinear Pairings for Vehicular Ad Hoc NetworksXiaojun Li, Liangmin Wang. 890-895  [doi]
 - Reputation Based Security Model for Android ApplicationsWelderufael Berhane Tesfay, Todd Booth, Karl Andersson. 896-901  [doi]
 - An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANETPramod Kumar Singh, Govind Sharma. 902-906  [doi]
 - Effects of IDSs on the WSNs Lifetime: Evidence of the Need of New ApproachesKrishna Doddapaneni, Enver Ever, Orhan Gemikonakli, Leonardo Mostarda, Alfredo Navarra. 907-912  [doi]
 - Evaluation of a Fast Symmetric Cryptographic Algorithm Based on the Chaos Theory for Wireless Sensor NetworksIsmail Mansour, Gérard Chalhoub, Bassem Bakhache. 913-919  [doi]
 - An Investigation into the Evolution of Security Usage in Home Wireless NetworksThomas Stimpson, Lu Liu, Yongzhao Zhan. 920-925  [doi]
 - Security Server-Based Architecture for Mobile Ad Hoc NetworksSalaheddin Darwish, Simon J. E. Taylor, Gheorghita Ghinea. 926-930  [doi]
 - CONDOR: A Hybrid IDS to Offer Improved Intrusion DetectionDavid J. Day, Denys A. Flores, Harjinder Singh Lallie. 931-936  [doi]
 - An SLA-based Framework for Estimating Trustworthiness of a CloudSudip Chakraborty, Krishnendu Roy. 937-942  [doi]
 - A Combined Clustering Scheme for Protecting Location Privacy and Query Privacy in Pervasive EnvironmentsChi Lin, Guowei Wu, Lin Yao, Zuosong Liu. 943-948  [doi]
 - Enhancing User Identity Privacy in LTEHiten Choudhury, Basav Roychoudhury, Dilip K. Saikia. 949-957  [doi]
 - Privacy-Preserving Digital Rights Management in a Trusted Cloud EnvironmentRonald Petrlic. 958-963  [doi]
 - ILACF: An Incentive-Based Low-Latency Anonymous Communication FrameworkXin Chen, Qiao-lin Hu, Hao Lu, Ge-Ming Xia, Jun Long. 964-969  [doi]
 - A Covert Timing Channel Based on Fountain CodesRennie Archibald, Dipak Ghosal. 970-977  [doi]
 - A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor NetworksMuhammad Bashir Abdullahi, Guojun Wang. 978-985  [doi]
 - Network Coding-Based Mutual Anonymity Communication Protocol for Mobile P2P NetworksZhi-yuan Li, Liang-min Wang, Si-guang Chen. 986-991  [doi]
 - A Lightweight Privacy Preserving Approach for Analyzing Communication Records to Prevent VoIP Attacks Using Toll Fraud as an ExampleStefan Hofbauer, Kristian Beckers, Gerald Quirchmayr, Christoph Sorge. 992-997  [doi]
 - Trustworthy Infrastructure Services for a Secure and Privacy-Respecting Internet of ThingsDennis Gessner, Alexis Olivereau, Alexander Salinas Segura, Alexandru Serbanati. 998-1003  [doi]
 - Design and Evaluation of SensorSafe: A Framework for Achieving Behavioral Privacy in Sharing Personal Sensory InformationHaksoo Choi, Supriyo Chakraborty, Mani B. Srivastava. 1004-1011  [doi]
 - Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation FrameworkChunhua Su, Guilin Wang, Kouichi Sakurai. 1012-1017  [doi]
 - A Light-Weight Commodity Integrity Detection Algorithm Based on Chinese Remainder TheoremChaoliang Li, Guojun Wang. 1018-1023  [doi]
 - An Architecture for the Enforcement of Privacy and Security Requirements in Internet-Centric ServicesYair Diaz-Tellez, Eliane L. Bodanese, Srijith K. Nair, Theo Dimitrakos. 1024-1031  [doi]
 - A Quantum-classical Hybrid Architecture for Security Algorithms AccelerationRafael Trapani Possignolo, Cintia B. Margi. 1032-1037  [doi]
 - A Quantum TITO Diversity Transmission Scheme with Quantum Teleportation of Non-maximally Entangled Bell StateJinjing Shi, Ronghua Shi, Ying Guo, Moon Ho Lee. 1038-1041  [doi]
 - Information Security of IPsec-based Mobile VPN: Authentication and Encryption Algorithms PerformanceAlexander V. Uskov. 1042-1048  [doi]
 - Inflammation Security: A Decentralised Immune Model for Resource Distribution in NetworksMark Heydenrych, Elizabeth Ehlers. 1049-1056  [doi]
 - Analysis and Improvements of Two Identity Based Anonymous Signcryption Schemes for Multiple ReceiversHuaqun Wang, Yuqing Zhang, Bo Qin. 1057-1062  [doi]
 - Assuring Data Privacy in Cloud TransformationsTom Kirkham, Django Armstrong, Karim Djemame, Marcelo Corrales, Mariam Kiran, Iheanyi Nwankwo, Ming Jiang, Nikolaus Forgó. 1063-1069  [doi]
 - BlendFuzz: A Model-Based Framework for Fuzz Testing Programs with Grammatical InputsDingning Yang, Yuqing Zhang, Qixu Liu. 1070-1076  [doi]
 - A Dynamic Distributed Key Tunneling Protocol for Heterogeneous Wireless Sensor NetworksRamzi Bellazreg, Noureddine Boudriga, Mohamed Hamdi. 1077-1082  [doi]
 - Static Detection of Logic Vulnerabilities in Java Web ApplicationsYing Kong, Yuqing Zhang, Zhejun Fang, Qixu Liu. 1083-1088  [doi]
 - A Multi-agent Immunologically-inspired Model for Critical Information Infrastructure Protection - An Immunologically-inspired Conceptual Model for Security on the Power GridSheu M. A. Mavee, Elizabeth Marie Ehlers. 1089-1096  [doi]
 - Autonomous Group-Based Authentication Mechanism in Mobile Ad Hoc NetworksParisa Memarmoshrefi, Omar Alfandi, Ansgar Kellner, Dieter Hogrefe. 1097-1102  [doi]
 - A Trust Model Based on P2P Trust Models for Secure Global GridsDamandeep Kaur, Jyotsna Sengupta. 1103-1108  [doi]
 - Design and Implementation of Facebook Crawler Based on Interaction SimulationZhefeng Xiao, Bo Liu, Huaping Hu, Tian Zhang. 1109-1112  [doi]
 - More Choices, More Control: Extending Access Control by Meta-rights ReallocationAdnan Ahmad, Brian Whitworth, Lech J. Janczewski. 1113-1118  [doi]
 - Assessing Overhead Cost Associated with Encrypting Swap FileBushra AlBelooshi, K. Salah, T. Marin, A. Bentiba. 1119-1123  [doi]
 - A Data-Reachability Model for Elucidating Privacy and Security Risks Related to the Use of Online Social NetworksSadie Creese, Michael Goldsmith, Jason R. C. Nurse, Elizabeth Phillips. 1124-1131  [doi]
 - Detection and Prevention of Data Manipulation from Client Side in Web ApplicationsMohammad Ghafari, Hamid Shoja, Mohammad Yosef Amirani. 1132-1136  [doi]
 - Analysing Impact of Scalability and Heterogeneity on the Performance of Federated Cloud SecuritySyed Naqvi, Arnaud Michot, Michael Van de Borne. 1137-1142  [doi]
 - Cloud SSDLC: Cloud Security Governance Deployment Framework in Secure System Development Life CycleTien-Cheu Kao, Ching-Hao Mao, Chien-Yu Chang, Kai-Chi Chang. 1143-1148  [doi]
 - On Increasing the Computational Efficiency of Long Integer Multiplication on FPGAIsmail San, Nuray At. 1149-1154  [doi]
 - A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone PlatformsMartin Pirker, Daniel Slamanig. 1155-1160  [doi]
 - Experimenting with ARM TrustZone - Or: How I Met Friendly Piece of Trusted HardwareJohannes Winter. 1161-1166  [doi]
 - Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP AddressesFahd Al-Haidari, Mohammed H. Sqalli, Khaled Salah. 1167-1174  [doi]
 - Locating the Attacker of Wormhole Attack by Using the HoneypotT. Divya Sai Keerthi, Pallapa Venkataram. 1175-1180  [doi]
 - Malicious AODV: Implementation and Analysis of Routing Attacks in MANETsHumaira Ehsan, Farrukh Aslam Khan. 1181-1187  [doi]
 - Securing Trusted Execution Environments with PUF Generated Secret KeysMatthew Areno, Jim Plusquellic. 1188-1193  [doi]
 - Restricted Identification without Group KeysLucjan Hanzlik, Kamil Kluczniak, Przemyslaw Kubiak, Miroslaw Kutylowski. 1194-1199  [doi]
 - On a Visual Secret Sharing Scheme with High Quality DecryptionVipin Kumar, Chirag Chetan, Aparajita Ojha. 1200-1203  [doi]
 - Toward Authenticated and Complete Query Results from Cloud StoragesFu-Kuo Tseng, Yung-Hsiang Liu, Rong-Jaye Chen. 1204-1209  [doi]
 - Security Issues of a Publicly Accessible Cloud Computing InfrastructureGordon Russell, Richard Macfarlane. 1210-1216  [doi]
 - File Exchange in CloudRafael Timóteo de Sousa Júnior, Edna Dias Canedo, Robson de Oliveira Albuquerque, Flavio Elias Gomes de Deus. 1217-1222  [doi]
 - Towards Semantic-Enhanced Attribute-Based Access Control for Cloud ServicesZahid Iqbal, Josef Noll. 1223-1230  [doi]
 - Self-Protecting Documents for Cloud Storage SecurityManuel Munier, Vincent Lalanne, Magali Ricarde. 1231-1238  [doi]
 - Border Gateway Protocol Anomaly Detection Using Failure Quality Control MethodMuhammad Mujtaba, Priyadarsi Nanda, Xiangjian He. 1239-1244  [doi]
 - AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNsLongxiang Gao, Ming Li, Tianqing Zhu, Alessio Bonti, Wanlei Zhou, Shui Yu. 1245-1250  [doi]
 - Android Malware Detection via a Latent Network Behavior AnalysisTe-En Wei, Ching-Hao Mao, Albert B. Jeng, Hahn-Ming Lee, Horng-Tzer Wang, Dong-Jie Wu. 1251-1258  [doi]
 - A Layered Malware Detection Model Using VMMLin Chen, Bo Liu, Huaping Hu, Qianbing Zheng. 1259-1264  [doi]
 - Distributed Privacy Preserving Classification Based on Local Cluster IdentifiersNico Schlitter, Jörg Lässig. 1265-1272  [doi]
 - Privacy Protecting by Multiattribute Clustering in Data-Intensive ServiceQing Zhu, Ning Li. 1273-1278  [doi]
 - Fuzzy Logic Election of Node for Routing in WSNsShaik Sahil Babu, Arnab Raha, Mrinal Kanti Naskar, Omar Alfandi, Dieter Hogrefe. 1279-1284  [doi]
 - Location-Based Authentication and Authorization Using Smart PhonesFeng Zhang, Aron Kondoro, Sead Muftic. 1285-1292  [doi]
 - A Formally Verified Device Authentication Protocol Using Casper/FDRMahdi Aiash, Glenford E. Mapp, Raphael C.-W. Phan, Aboubaker Lasebae, Jonathan Loo. 1293-1298  [doi]
 - Provably Secure Two-Party Explicit Authenticated Key Agreement ProtocolMinghui Zheng, Jing Chen. 1299-1303  [doi]
 - Integrity Verification Architecture (IVA) Based Security Framework for Windows Operating SystemMohd Anuar Mat Isa, Habibah Hashim, Jamalul-lail Ab Manan, Ramlan Mahmod, Hanunah Othman. 1304-1309  [doi]
 - Performance Evaluation of Shared Hosting Security MethodsSeyed Ali Mirheidari, Sajjad Arshad, Saeidreza Khoshkdahan. 1310-1315  [doi]
 - Security Aspects of Soft Verified Messages Protected by Message Authentication CodesNatasa Zivic. 1316-1322  [doi]
 - Using Subjective Logic to Handle Uncertainty and ConflictsMurat Sensoy, Jeff Z. Pan, Achille Fokoue, Mudhakar Srivatsa, Felipe Meneguzzi. 1323-1326  [doi]
 - Random4: An Application Specific Randomized Encryption Algorithm to Prevent SQL InjectionSrinivas Avireddy, Varalakshmi Perumal, Narayan Gowraj, Ram Srivatsa Kannan, Prashanth Thinakaran, Sundaravadanam Ganapthi, Jashwant Raj Gunasekaran, Sruthi Prabhu. 1327-1333  [doi]
 - A Multi-tunnel VPN Concurrent System for New Generation Network Based on User SpaceYan Shen, Qi-fei Zhang, Ling-di Ping, Yan-fei Wang, Wen-juan Li. 1334-1341  [doi]
 - Development of a Typing Behaviour Recognition Mechanism on AndroidXuan Huang, Geoffrey Lund, Andrew Sapeluk. 1342-1347  [doi]
 - Domain Name to IP Address Resolution System with Multiple Name Servers Adaptable to MANETsYounchan Jung, Marnel Peradilla. 1348-1357  [doi]
 - A Scalable Anonymity Scheme Based on DHT Distributed InquiryWentao Wang, Yuewu Wang, Jiwu Jing, Zhongwen Zhang. 1358-1363  [doi]
 - Secure Reputation Framework for BitTorrentHani Ragab Hassen, Olga Jones, Nikos Galanis. 1364-1369  [doi]
 - RedJsod: A Readable JavaScript Obfuscation Detector Using Semantic-based AnalysisIsmail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Kuo-Ping Wu, Ching-Hao Mao, Te-En Wei, Shyi-Ming Chen. 1370-1375  [doi]
 - An Attribute-Based Encryption Scheme Secure against Malicious KGCGuoyan Zhang, Lei Liu, Yang Liu. 1376-1380  [doi]
 - Social Network Content Management through WatermarkingAthanasios Zigomitros, Achilleas Papageorgiou, Constantinos Patsakis. 1381-1386  [doi]
 - U+F Social Network Protocol: Achieving Interoperability and Reusability between Web Based Social NetworksLorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda. 1387-1392  [doi]
 - Mitigating SPIT with Social StrengthM. Ajmal Azad, Ricardo Morla. 1393-1398  [doi]
 - Evolution of Cooperation Based on Reputation on Dynamical NetworksLinlin Tian, MingChu Li, Weifeng Sun, Xiaowei Zhao, Baohui Wang, Jianhua Ma. 1399-1404  [doi]
 - Engagement and Cooperation in Social Networks: Do Benefits and Rewards Help?Sanat Kumar Bista, Surya Nepal, Cécile Paris. 1405-1410  [doi]
 - Practicable Unified Security, Trust and Privacy (STP) Framework for Federated Access Management (FAM)Jamalul-lail Ab Manan, Zubair Ahmad Khattak, Suziah Sulaiman. 1411-1416  [doi]
 - Evaluation of Trustworthiness of Reviews in the Online Travel CommunityYifang Ku, Hsiao-Hui Li, Fan Wu. 1417-1422  [doi]
 - Research on Trust Issue of Current Chinese C2C E-commerce: Problems and SolutionsYu Zhang. 1423-1428  [doi]
 - How to Track Your Data: Rule-Based Data Provenance Tracing AlgorithmsOlive Qing Zhang, Ryan K. L. Ko, Markus Kirchberg, Chun Hui Suen, Peter Jagadpramana, Bu-Sung Lee. 1429-1437  [doi]
 - VehiCloud: Cloud Computing Facilitating Routing in Vehicular NetworksYang Qin, Dijiang Huang, Xinwen Zhang. 1438-1445  [doi]
 - Geographic-Based Service Request Scheduling Model for Mobile Cloud ComputingTianyi Xing, Hongbin Liang, Dijiang Huang, Lin X. Cai. 1446-1453  [doi]
 - Evaluating Ubiquitous Sensor Information Sharing on the Internet-of-ThingsStefan Forsström, Patrik Österberg, Theo Kanter. 1454-1460  [doi]
 - A Block-Based Still Image Coder for Parallel ComputingYu-Lin Wang, Chia-Te Liao, Alvin Wen-Yu Su. 1461-1468  [doi]
 - The Load Balancing Problem in Extended OTIS-n-Cube Interconnection NetworksJehad Al-Sadi. 1469-1474  [doi]
 - Performances of CS-DCSK UWB Communication System in the Presence of Narrow Band InterferersZhixiong Chen, Weikai Xu, Jin Huang, Lin Wang 0003. 1475-1480  [doi]
 - Enhanced Multi-rate Multicast for Optimal User Satisfaction and Efficient Bandwidth UtilizationKhodor Hamandi, Farah Saab, Ayman I. Kayssi. 1481-1485  [doi]
 - User Satisfaction Based ZFBF Scheduling Algorithm in Multi-user MIMO SystemHailang Cao, Ping Wang, Lei Chen, Fuqiang Liu, Xinhong Wang, Yin Zhu, Huifang Pang. 1486-1490  [doi]
 - Discovering a Large Scale Internet Topology: Complementary and Contrast ViewHao Yin, Heungsun Chang, Fangming Liu, Tongyu Zhan, Ying Zhang, Bo Li 0001. 1491-1498  [doi]
 - Interference Free Integration of Pervasive ApplicationsChristophe Soares, Rui S. Moreira, Ricardo Morla, José Torres, Pedro Sobral. 1499-1506  [doi]
 - Including Metadata into an Ontology Based Pervasive Computing ArchitectureMartin Peters, Christopher Brink, Sabine Sachweh. 1507-1512  [doi]
 - Chronological Accommodation of Oculo-motors in Response to Varying Sizes of Visual StimuliMinoru Nakayama, Masashi Fujimoto. 1513-1519  [doi]
 - Ubiquitous Secure Interactions with Intelligent Artifacts on the Internet-of-ThingsStefan Forsström, Theo Kanter, Patrik Österberg. 1520-1524  [doi]
 - Optimal Resource Allocation for Multi-layered Video Streaming over Multi-channel Cognitive Radio NetworksBo Guan, Yifeng He. 1525-1528  [doi]
 - Distributed Rerouting for Multiple Sessions in Cognitive Radio NetworksYing Dai, Jie Wu 0001. 1529-1536  [doi]
 - Formal Verification of a Key Agreement Protocol for Wireless Sensor NetworksYue Li, Dehua Chen, Thomas Newe. 1537-1542  [doi]
 - Window Energy Detection for Unmanned Surveillance with PIR SensorSang Gi Hong, Young Bag Moon, Naesoo Kim, Whan-Woo Kim. 1543-1547  [doi]
 - A Dynamic Bandwidth Allocation Algorithm for a Multi-sink Wireless Sensor Network Converged with a Passive Optical NetworkZhenfei Wang, Kun Yang, David K. Hunter. 1548-1554  [doi]
 - Fast and Efficient Information Dissemination in Event-Based Wireless Sensor NetworksSain Saginbekov, Arshad Jhumka. 1555-1561  [doi]
 - Data-centric Dissemination to Mobile Sink Group in Wireless Sensor NetworksHee-Sook Mo, Hyochan Bang, Cheol-Sig Pyo. 1562-1569  [doi]
 - Link Stability Evaluation and Stability Based Multicast Routing Protocol in Mobile Ad Hoc NetworksZhiyong Zhang, Zhiping Jia, Hui Xia. 1570-1577  [doi]
 - A Reliability-Based Routing Scheme for Vehicular Ad Hoc Networks (VANETs) on HighwaysMahmoud Hashem Eiza, Qiang Ni. 1578-1585  [doi]
 - Hyper-mutation Based Genetic Algorithms for Dynamic Multicast Routing Problem in Mobile Ad Hoc NetworksHui Cheng, Shengxiang Yang. 1586-1592  [doi]
 - A Reception Based Node Selection Protocol for Multi-hop Routing in Vehicular Ad-hoc NetworksM. Bilal, M. O. Hussain, Pauline M. L. Chan. 1593-1600  [doi]
 - Flow-Aware Broadcasting AlgorithmDiogo Lima, Hugo Miranda. 1601-1608  [doi]
 - User Preferences-Adaptive Dynamic Network Selection Approach in Cooperating Wireless Networks: A Game Theoretic PerspectiveHaris Pervaiz, Qiang Ni. 1609-1616  [doi]
 - Design and Analysis of Multicast-Based Publisher/Subscriber Models over Wireless Platforms for Smart Grid CommunicationsSina Fateri, Qiang Ni, Gareth A. Taylor, Sivanantharasa Panchadcharam, Ioana Pisica. 1617-1623  [doi]
 - A HiperLAN/2 Based MAC Protocol for Efficient Vehicle-to-Infrastructure Communication Using Directional Wireless Mesh BackboneSandip Chakraborty, Sukumar Nandi. 1624-1631  [doi]
 - Location Assisted Vertical Handover Algorithm for QoS Optimization in End-to-end ConnectionsMartin S. Dam, Steffen Christensen, Lars M. Mikkelsen, Rasmus L. Olesen. 1632-1640  [doi]
 - Collision and Detection Performance with Three Overlap Signal Collisions in Space-Based AIS ReceptionMenghui Yang, Yongzhong Zou, Li Fang. 1641-1648  [doi]
 - Error Performance Analysis of Opportunistic Relaying System Based on DCSKJin Huang, Zhexin Xu, Weikai Xu, Lin Wang 0003. 1649-1653  [doi]
 - Modelling of Prioritised Vertical Handoff Scheme in Integrated UMTS/WLANsZaid Ahmed Said Zabanoot, Geyong Min. 1654-1660  [doi]
 - Design and Evaluation of an Operational Mobility Model over IPv6 (OMIPv6) Based on ID/Locator Split ArchitectureYulei Wu, Jingguo Ge, Junling You, Yuepeng E.. 1661-1665  [doi]
 - AR Teleport: Digital Reconstruction of Historical and Cultural-Heritage Sites Using Mobile Augmented RealityJiyoung Kang. 1666-1675  [doi]
 - A Model Driven Infrastructure for Context-Awareness Mobile Assessment PersonalizationAhlem Harchay, Lilia Cheniti-Belcadhi, Rafik Braham. 1676-1683  [doi]
 - Modeling an Enhanced Tuple Space Based Mobile Middleware in UNITYSuddhasil De, Sukumar Nandi, Diganta Goswami. 1684-1691  [doi]
 - A Trajectory Model to Deal with Transmission FailuresFrancisco Javier Moreno Arboleda, Sebastian Munera, Luis Munoz. 1692-1697  [doi]
 - Improving the Energy-Efficiency of GPS Based Location Sensing Smartphone ApplicationsThomas Olutoyin Oshin, Stefan Poslad, Athen Ma. 1698-1705  [doi]
 - Efficient Internet Mapping in the Presence of Network Load BalancersMehiar Dabbagh, Naoum Sayegh, Ayman I. Kayssi. 1706-1713  [doi]
 - The Impact of Sensor Node Distribution on Routing Protocols Performance: A Comparitive StudyUthman Baroudi, Anas Al-Roubaiey, Samir Mekid, Abdelhafid Bouhraoua. 1714-1720  [doi]
 - A Temporalised Belief Logic for Reasoning about Authentication ProtocolsJi Ma, Klaus-Dieter Schewe. 1721-1728  [doi]
 - Cross-Technology Overlay Control Protocol for Resource Management in Converged NetworksAndreas Bontozoglou, Kun Yang, Ken Guild. 1729-1734  [doi]
 - Improving Query for P2P SIP VoIPLinchen Yu. 1735-1740  [doi]
 - A Round Robin Load Balancing and Redundancy Protocol for Network RoutersSarah Abdallah, Elias Najjar, Ayman I. Kayssi. 1741-1747  [doi]
 - Genetic Algorithm in Resource Provider Selection for Personal Live Content Delivery in User-Provided PlatformJoseph C. H. So, Po-Choi Wong. 1748-1754  [doi]
 - On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for DisastersShinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka. 1755-1762  [doi]
 - A Hybrid Ontological and Temporal Approach for Composite Activity ModellingGeorge Okeyo, Liming Chen, Hui Wang 0001, Roy Sterritt. 1763-1770  [doi]
 - Categorising Context and Using Short Term Contextual Information to Obtain Long Term ContextAbhinav Duggal, Manoj Misra, Ramesh Srinivasaraghavan. 1771-1776  [doi]
 - Semantic Decision Support Models for Energy Efficiency in Smart-Metered HomesYan Tang, Ioana Ciuciu. 1777-1784  [doi]
 - Robot Navigation Using Brain-Computer InterfacesAthanasios Vourvopoulos, Fotis Liarokapis. 1785-1792  [doi]
 - A Comprehensive Ontology for Knowledge Representation in the Internet of ThingsWei Wang 0042, Suparna De, Ralf Tönjes, Eike Steffen Reetz, Klaus Moessner. 1793-1798  [doi]
 - Hybrid Ontology Matching for Solving the Heterogeneous Problem of the IoTZhichun Wang, Rongfang Bie, Mingquan Zhou. 1799-1804  [doi]
 - Design of Real Time Multimedia Platform and Protocol to the Internet of ThingsWei Jiang, Limin Meng. 1805-1810  [doi]
 - Knowledge Acquisition and Management Architecture for Mobile and Personal Health Environments Based on the Internet of ThingsAntonio J. Jara, Miguel A. Zamora, Antonio F. Gómez-Skarmeta. 1811-1818  [doi]
 - Efficient Searching Mechanism for Trust-Aware Recommender Systems Based on Scale-Freeness of Trust NetworksWeiwei Yuan, Donghai Guan, Lei Shu, Jianwei Niu. 1819-1823  [doi]
 - Square-Root Unscented Kalman Filtering Based Localization and Tracking in the Internet of ThingsJunqi Guo, Hongyang Zhang, Yunchuan Sun, Rongfang Bie. 1824-1829  [doi]
 - A Text Representation Method Based on Harmonic SeriesXue Chen, Chao Wu. 1830-1834  [doi]
 - Research on Embedding ECC into RFID Authentication ProtocolGuicheng Shen, Bingwu Liu. 1835-1838  [doi]
 - A Hybrid MPI/OpenMP Model Based on DDM for Large-Scale Partial Differential EquationsDandan Li, Xiaohui Ji, ZhangBing Zhou, Qun Wang. 1839-1843  [doi]
 - Real-Time Distributed Sensor-Assisted mHealth Applications on the Internet-of-ThingsStefan Forsström, Theo Kanter, Olle Johansson. 1844-1849  [doi]
 - Quality Assessment of Video Transmission in Heterogeneous Networks as Applied to Real-Time TelecareColin Bailey, Xiao-Hong Peng. 1850-1855  [doi]
 - Time- and Frequency-Domain Impulsive Noise Spreader for OFDM SystemsS. Nayyef, Charalampos Tsimenidis, Arafat J. Al-Dweik, Bayan S. Sharif, Ali Hazmi. 1856-1861  [doi]
 - DSDV, DYMO, OLSR: Link Duration and Path StabilityS. Kumar, Nadeem Javaid, Z. Yousuf, H. Kumar, Zahoor Ali Khan, Ayesha Bibi. 1862-1866  [doi]
 - Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETsS. Sagar, Nadeem Javaid, Zahoor Ali Khan, J. Saqib, Ayesha Bibi, Safdar Hussain Bouk. 1867-1871  [doi]
 - Role Based Privacy-Aware Secure Routing in WMNsHui Lin, Jia Hu, Atulya Nagar, Li Xu. 1872-1877  [doi]
 - An Ant Colony Optimization Algorithm for Overlay Backbone Multicast Routing in Content Delivery NetworksGang Liu, Hua Wang, Hong Zhang. 1878-1882  [doi]
 - The Research and Application of a Specific Instruction Processor for SMS4Zhenzhou Li, Feng Li, Zhiping Jia, Lei Ju, Renhai Chen. 1883-1888  [doi]
 - Prediction-Based Algorithm for Event Detection in Wireless Sensor NetworksYongji Yu, Zhiping Jia, Ruihua Zhang. 1889-1894  [doi]
 - Testing Method of Code Redundancy Simplification Based on Program Dependency GraphYang Fan, Zhang Huanguo, Yan-Fei, Yang Jian. 1895-1900  [doi]
 - Dynamic Optimization on Multi-core PlatformJiahui Wen, Li Shen, Zhiying Wang. 1901-1906  [doi]
 - A Dynamic Cache Partitioning Mechanism under Virtualization EnvironmentXiaolin Wang, Xiang Wen, Yechen Li, Yingwei Luo, Xiaoming Li, Zhenlin Wang. 1907-1911  [doi]
 - HVD-TLS: A Novel Framework of Thread Level SpeculationFan Xu, Shen Li, Zhiying Wang. 1912-1917  [doi]
 - An Efficient Distributed Transactional Memory SystemXin Peng, Xiaofei Liao, Hai Jin, Xuepeng Fan, Xuping Tu, Linchen Yu. 1918-1923  [doi]
 - Causal Analysis of Student's Characteristics of Note-Taking Activities and Learning Performance during a Fully Online CourseMinoru Nakayama, Kouichi Mutsuura, Hiroh Yamamoto. 1924-1929  [doi]
 - Research on Cooperative Learning of Digital English Writing in Network EnvironmentXiaodong Li, Hong Zhang. 1930-1935  [doi]
 - Development and Validation of a Virtual Worklog as a Collaboration Tool for the Kelluwen Learning CommunityKatherine Inalef, Julio Guerra, Eliana Scheihing. 1936-1941  [doi]
 - Actualization of a Course Library through Influential Twitter KnowledgeMalinka Ivanova, Tatyana Ivanova. 1942-1947  [doi]
 - The Current State of Understanding of the Energy Efficiency of Cloud ComputingFrancis Owusu, Colin Pattinson. 1948-1953  [doi]
 - Enabling the IoT Paradigm in E-health Solutions through the VIRTUS MiddlewareMarco Bazzani, Davide Conzon, Andrea Scalera, Maurizio A. Spirito, Claudia Irene Trainito. 1954-1959  [doi]
 - Ubiquitous HealthCare in Wireless Body Area NetworksN. A. Khan, Nadeem Javaid, Zahoor Ali Khan, M. Jaffar, U. Rafiq, Ayesha Bibi. 1960-1967  [doi]
 - Performance Study of Localization Techniques in Wireless Body Area Sensor NetworksObaid Ur Rehman, Nadeem Javaid, Ayesha Bibi, Zahoor Ali Khan. 1968-1975  [doi]
 - Radio Frequency Energy Harvesting Characterization: An Experimental StudyUthman Baroudi, Amin-ud-din Qureshi, Samir Mekid, Abdelhafid Bouhraoua. 1976-1981  [doi]
 - A Novel System for Evaluating Website Using Link AnalysisXiaoqiang Li, Yun Mi, Yingwei Jin, Heng Qi, Zhiyang Li. 1982-1987  [doi]
 - An Efficient Detecting Communities Algorithm with Self-Adapted Fuzzy C-Means Clustering in Complex NetworksJianzhi Jin, Yuhua Liu, Laurence Tianruo Yang, Naixue Xiong, Fang Hu. 1988-1993  [doi]
 - An Analysis of Peer to Peer Protocols for Massively Multiplayer Online GamesAndrew Jones, Lu Liu, Nick Antonopoulos, Weining Liu. 1994-1999  [doi]
 - Padati: A Robust Pedestrian Dead Reckoning System on SmartphonesDeepak Pai, Inguva Sasi, Phani Shekhar Mantripragada, Mudit Malpani, Nitin Aggarwal. 2000-2007  [doi]
 - High Accuracy 3D Indoor Positioning Using Broadband Ultrasonic SignalsSérgio Ivan Lopes, José Manuel Neto Vieira, Daniel F. Albuquerque. 2008-2014  [doi]
 - Weighted Flow and Spectral Resource to Enhance QoS for Multi-hop Cognitive Radio NetworksYean-Fu Wen. 2015-2020  [doi]
 - An Integrated Mobile System for Long-Term Aerobic Activity Monitoring and Support in Daily LifeAttila Reiss, Didier Stricker, Ilias Lamprinos. 2021-2028  [doi]
 - Foundations for a Platform to Develop Context-aware Systems by Domain ExpertsDavid Martin, Carlos Lamsfus, Aurkene Alzua, Diego López-de-Ipiña. 2029-2034  [doi]
 - Joint Source-Channel Coding Based on P-LDPC Codes for Radiography Images TransmissionHuihui Wu, He Jiguang, Liangliang Xu, Lin Wang 0003. 2035-2039  [doi]