Volume 4, Numbers 1, February 2009
: Multi-Threshold Based Data Gathering Algorithms for Wireless Sensor Networks.
Volume 4, Numbers 2, April 2009
: Realization of SCM and CRM by Using RFID-captured Consumer Behavior Information.
, Yuefei Zhu
: Efficient Solution to Password-based Key Exchange for Large Groups.
Volume 4, Number 3, May 2009
Qurban A. Memon
: Implementing Role Based Access in Healthcare Ad Hoc Networks.
, Zhen Han
: User Authentication with Provable Security against Online Dictionary Attacks.
Volume 4, Number 4, June 2009
Recent Advances in Electronic Commerce and Security & Web Information Systems and Applications - Track on Networks
, Wandong Cai
: Interior Link Delay Reference of Ad Hoc Networks Based on End-to-End Measurement: Linear Analysis Model of Delay.
Volume 4, Number 5, July 2009
: Searching for Optimal Homing Sequences for Testing Timed Communication Protocols.
, Junhu Ruan
: Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation -M(1, 2, 3).
, Guohua Cui
: A Secure Hierarchical Identify Authentication Scheme Combining Trust Mechanism in Mobile IPv6 Networks.
: A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext.
Volume 4, Number 6, August 2009
Wireless Sensor Network:
Theory and Practice
, Jing Tian
: The Multicast Routing QoS Based on the Improved ACO Algorithm.
, Moncef Tagina
: Modeling and Prediction of the Internet End-to-end Delay using Recurrent Neural Networks.
Volume 4, Number 7, September 2009
Security of Wireless Communication Systems
: A Converged Charging Framework for Mobile Voice and Data Applications.
, Yuefei Zhu
: Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting.
, Zhishu Li
: Computing and Routing for Trust in Structured P2P Network.
Volume 4, Number 8, October 2009
Performance Evaluation of Communication Networks
, Zengtang Qu
: Comparison Computing Based on Sub-optimum Analysis: A Guide System of Network Security.
Volume 4, Number 9, November 2009
Performance Evaluation of Computer Networks
Volume 4, Number 10, December 2009
Selected Papers of the IEEE International Conference on Computer and Information Technology (ICCIT 2008)
, Xiaolin Gui
: The Localized Area Coverage algorithm Based on Game-Theory for WSN.
, Gang Wu
, Shaoqian Li
: Preamble Design and Iterative Channel Estimation for OFDM/Offset QAM System.