27-11-2009, 07:32 PM
1. Computation-Efficient Multicast Key Distribution
2. Trustworthy Computing under Resource Constraints with the DOWN Policy
3. Securing User-Controlled Routing Infrastructures
4. Credit Card Fraud Detection Using Hidden Markov Model
5. Temporal Partitioning of Communication Resources in an Integrated Architecture
6. Provably Secure Three Party Authenticated Quantum Key Distribution Protocols