| Number | Author | Country | Title |
| 432 | M. Bani Yassein, M. Bani Khalaf | Jordan | Performance Evolution Of Multiple Probabilities Of Ad-Hoc On Demand Distance Victor Protocol (AODV) |
| Jun-qing Li, Xin-you Li, Sheng-xian Xie, Chen Chen, | China | Time-Constraint Role-Based Access Control In Peer-To-Peer Networks | |
| Shadi Aljawarneh and Faisal Alkhateeb | Jordan |
A Semanticweb Technology-Based Architecture For New Server-Side Data Validation Inweb Applications |
|
|
Faisal Al-Hawi, Chan Yeob Yeun, Mahmoud Al-Qutayti, |
UAE |
Security Challenges For Emerging VANEts |
|
| 490 |
Mohamed N. El-Eskandrani, Ehab F. Badran and Darwish A. Mohamed |
Egypt | Investigation Of The Performance Of The Wavelet Packet Based Multi-Carrier CDMA Communications In Rayleigh Fading Channel |
| 491 |
Essam Al daoud, Ahid Al-Shbail, Adnan M. Al-Smadi, |
Jordan |
Detecting Metamorphic Viruses By Using Arbitrary Length Of Control Flow Graphs And Nodes Alignment |
| 509 | Amir H. Chinaei, Ken Barker, Frank Wm. Tompa | Canada |
Space Of Access Control Administration Models |
| 590 | Khaled M. Suwais, Azman Samsudin | Malaysia |
Comprehensive Survey On The Constructional Design Of Existing Stream Ciphers |
| 604 | Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly | AUE |
Security, Privacy, Authentication In RFID And Applications Of Smart E-Travel |