Table of Contents
Front Covers
Cover1
Cover2
Regular Papers
Anonymous Geo-Forwarding in MANETs through Location Cloaking
Xiaoxin Wu, Jun Liu, Xiaoyan Hong, Elisa Bertino
A More Practical Approach for Single-Packet IP Traceback Using Packet Logging and Marking
Chao Gong, Kamil Sarac
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Huai, Lionel M. Ni, Jian Ma
Secure Collaboration in a Mediator-Free Distributed Environment
Mohamed Shehab, Arif Ghafoor, Elisa Bertino
A Policy Evaluation Tool for Multisite Resource Management
Mudhakar Srivatsa, Nithya Rajamani, Murthy Devarakonda
How to Choose a Timing Model
Idit Keidar, Alexander Shraer
Efficient Breadth-First Search on the Cell/BE Processor
Daniele Paolo Scarpazza, Oreste Villa, Fabrizio Petrini
Prediction-Based Power-Performance Adaptation of Multithreaded Scientific Codes
Matthew Curtis-Maury, Filip Blagojevic, Christos D. Antonopoulos, Dimitrios S. Nikolopoulos
A Key Management Scheme Using Deployment Knowledge for Wireless Sensor Networks
Zhen Yu, Yong Guan
Efficient Algorithms for the p-Self-Protection Problem in Static Wireless Sensor Networks
Yu Wang, Xiang-Yang Li, Qian Zhang
Ads
Silver Bullet Security Podcasts
Build Your Career in Computing
Back Covers
Cover3
Cover4 |