1. Good T, Benaissa M (2010) A holistic approach examining RFID design for security and privacy. J Supercomput. doi: 10.1007/s11227-010-0497-9
2. Zeng Y, Cao J, Hong J, Zhang S, Xie L (2010) Secure localization and location verification in wireless sensor networks: a survey. J Supercomput. doi: 10.1007/s11227-010-0501-4
3. Li R, Li J (2010) Requirements and design for neutral trust management framework in unstructured networks. J Supercomput. doi: 10.1007/s11227-010-0502-3
4. Pongaliur K, Xiao L, Liu AX (2010) Dynamic camouflage event based malicious node detection architecture. J Supercomput. doi: 10.1007/s11227-010-0508-x
5. Wang F, Wang FR, Huang B, Yang LT (2011) ADVS: a reputation-based model on filtering SPIT over P2P-VoIP networks. J Supercomput. doi: 10.1007/s11227-010-0545-5