| Personal Information Privacy Settings of Online Social Networks and Their Suitability for Mobile Internet Devices |
| Nahier Aldhafferi, Charles Watson and A.S.M Sajeev, University of New England, Australia |
| Volume : 2 volume number : 2 pdf |
| Managing the Intertwining Among Users, Roles, Permissions, and User Relationships in an Information Flow Control Model |
| Shih-Chien Chou, National Dong Hwa University, Hualien, Taiwan |
| Volume : 2 volume number : 2 pdf |
| An Evaluation of Energy Efficient Source Authentication Methods for False Data Filtering in WSN |
| Syama M and Deepti C, The Oxford College of Engineering, India |
| Volume : 2 volume number : 2 pdf |
| A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification Service |
| Ramya Shivanagu and Deepti C, The Oxford College of Engineering, India |
| Volume : 2 volume number : 2 pdf |