


default search action
GLOBECOM 2012: Anaheim, California, USA
- 2012 IEEE Global Communications Conference, GLOBECOM 2012, Anaheim, CA, USA, December 3-7, 2012. IEEE 2012, ISBN 978-1-4673-0920-2

- Jung-Tsung Tsai, Yen-Cheng Li:

Quasi-greedy geographic routing in wireless networks. 8-13 - Zimu Yuan, Wei Li, Shuhui Yang:

A new routing scheme based on adaptive selection of geographic directions. 14-19 - Rumi Ghosh, J. J. Garcia-Luna-Aceves:

Automatic routing using multiple prefix labels. 20-25 - Jiajia Liu

, Xiaohong Jiang, Hiroki Nishiyama
, Nei Kato:
Throughput capacity of the group-based two-hop relay algorithm in MANETs. 26-30 - Donovan Bradley, R. N. Uma:

Energy-efficient routing through Weighted Load Balancing. 31-37 - Qian Zhang, David W. Matolak:

Ad hoc network metrics: Which is best? 38-43 - Marwane Ayaida, Mohtadi Barhoumi, Hacène Fouchal

, Yacine Ghamri-Doudane, Lissan Afilal:
HHLS: A hybrid routing technique for VANETs. 44-48 - Po-Jui Chiu, Hsin-Mu Tsai

:
An intersection collision avoidance system for scooters utilizing non-line-of-sight links. 49-55 - Tarik Taleb, Adlen Ksentini, Fethi Filali

:
Wireless connection steering for vehicles. 56-60 - Francesco Chiti

, Romano Fantacci
, Riccardo Mastandrea:
A low complexity clustering approach enabling context awareness in sparse VANETs. 61-66 - Pierpaolo Salvo

, Mario De Felice, Francesca Cuomo
, Andrea Baiocchi:
Infotainment traffic flow dissemination in an urban VANET. 67-72 - Maram Bani Younes

, Graciela Román-Alonso, Azzedine Boukerche:
A distributed infrastructure-based congestion avoidance protocol for Vehicular Ad Hoc Networks. 73-78 - Benjamin Pearre

, Timothy X. Brown:
Energy conservation in sensor network data ferrying: A reinforcement metalearning approach. 79-85 - Andrew Wichmann, Justin Chester, Turgay Korkmaz:

Smooth path construction for data mule tours in wireless sensor networks. 86-92 - Xiaojiang Ren, Weifa Liang

:
Delay-tolerant data gathering in energy harvesting sensor networks with a mobile sink. 93-99 - Fang-Jing Wu

, Hsiu-Chi Hsu, Yu-Chee Tseng:
Traffic-attracted mobile relay deployment in a wireless ad hoc network. 100-105 - Jun Tao, Liang He, Yanyan Zhuang, Jianping Pan

, Maryam Ahmadi:
Sweeping and active skipping in wireless sensor networks with mobile elements. 106-111 - Mahdy Nabaee, Fabrice Labeau

:
Restricted Isometry Property in Quantized Network Coding of sparse messages. 112-117 - Diego G. Passos

, Célio Vinicius N. de Albuquerque
:
Modeling the transmission of coded packets for coding aware routing. 118-124 - Wei Bao

, Vahid Shah-Mansouri, Vincent W. S. Wong
, Victor C. M. Leung
:
TCP VON: Joint congestion control and online network coding for wireless networks. 125-130 - Suhas Shetty, Ahmed E. Kamal:

Hybrid network-erasure coding protection of multi-source, multi-sink multicast sessions in WSNs. 131-137 - Fei Wu, Cunqing Hua, Hangguan Shan, Aiping Huang:

MWNCast: Cooperative multicast based on moving window network coding. 138-144 - Mohammed-Amine Koulali, Abdellatif Kobbane

, Mohammed El Koutbi, Jalel Ben-Othman
:
Optimal distributed relay selection for duty-cycling Wireless Sensor Networks. 145-150 - Markus Leinonen, Marian Codreanu

, Markku J. Juntti
:
Consensus based distributed joint power and routing optimization in wireless sensor networks. 151-156 - Alessandro Camillò, Chiara Petrioli

:
Hands on IRIS: Lessons learned from implementing a cross layer protocol stack for WSNs. 157-163 - Udara Sadathana Wijetunge, Sylvie Perreau, André Pollok

:
Fast convergence in stochastic routing for wireless sensor networks: An analytical perspective. 164-170 - Ehsan Ahvar, Marcelo Yannuzzi

, René Serral-Gracià, Eva Marín-Tordera, Xavier Masip-Bruin
, Shohreh Ahvar:
Improving learning automata-based routing in Wireless Sensor Networks. 171-176 - Imane Horiya Brahmi, Soufiene Djahel

, Yacine Ghamri-Doudane:
A Hidden Markov Model based scheme for efficient and fast dissemination of safety messages in VANETs. 177-182 - Maurice Khabbaz

, Hamed M. K. Alazemi, Chadi Assi:
Stochastic Data Delivery delay analysis in intermittently connected vehicular networks. 183-188 - Yi-Ling Hsieh, Kuochen Wang:

A road-based QoS-aware multipath routing for urban vehicular ad hoc networks. 189-194 - Celimuge Wu

, Satoshi Ohzahata, Toshihiko Kato:
Routing in VANETs: A fuzzy constraint Q-Learning approach. 195-200 - Tahani Gazdar, Abderrezak Rachedi

, Abderrahim Benslimane
, Abdelfettah Belghith
:
A distributed advanced analytical trust model for VANETs. 201-206 - Faisal Khan, Yusun Chang

, Sungjin Park, John A. Copeland:
Towards guaranteed delivery of safety messages in VANETs. 207-213 - Sharief M. A. Oteafy

, Fadi M. Al-Turjman, Hossam S. Hassanein
:
Pruned Adaptive Routing in the heterogeneous Internet of Things. 214-219 - Zhenzhong Huang, Jun Zheng:

An entropy coding based hybrid routing algorithm for data aggregation in wireless sensor networks. 220-224 - Shichao Wang, Ruonan Zhang, Jianfeng Ma, Lin Cai

:
A simple energy-efficient routing algorithm for Wireless Sensor Networks based on Artificial Potential Field. 225-231 - Shuyun Luo, XuFei Mao, Yongmei Sun, Yuefeng Ji, Shaojie Tang:

Delay Minimum Data Collection in the low-duty-cycle wireless sensor networks. 232-237 - Mohamed Hefeida, Ashfaq A. Khokhar:

A cross-layer approach for context-aware data gathering in Wireless Sensor Networks. 238-243 - Yuqun Zhang, Chien-Liang Fok:

Receiver-based heading: Towards on-line energy efficient duty cycle assignments. 244-249 - Bruno F. Ferreira, João N. Isento, João A. Dias

, Joel J. P. C. Rodrigues, Liang Zhou:
An SNMP-based solution for vehicular delay-tolerant network management. 250-255 - Yue Cao

, Yingmin Wang, Shaoli Kang, Zhili Sun
:
Come-Stop-Leave (CSL): A geographic routing for Intermittently Connected Networks using delegation replication approach. 256-261 - Qinghua Shen, Weihua Zhuang

:
Energy efficient scheduling for delay constrained communication in wireless body area networks. 262-267 - Yunfei Hou

, Xu Li, Chunming Qiao:
TicTac: From transfer-incapable carpooling to transfer-allowed carpooling. 268-273 - Hua Chen, John S. Baras:

A distributed opportunistic scheduling protocol for multi-channel wireless ad-hoc networks. 274-279 - Ashraf E. Al-Fagih, Fadi M. Al-Turjman, Hossam S. Hassanein

:
Ubiquitous robust data delivery for integrated RSNs in IoT. 280-285 - Bobin Yao, Wenjie Wang, Qinye Yin:

Angle of departure aided sensor localization technique under multipath environment. 286-290 - Kaikai Liu, Xinxin Liu, Xiaolin Li:

Acoustic ranging and communication via microphone channel. 291-296 - Ying Zhu, Lixia Chen, Wei Zhang, Ai Chen, Xiaoxia Huang:

Device-free object tracking with wireless sensors. 297-302 - Sameh Sorour, Yves Lostanlen, Shahrokh Valaee:

RSS based indoor localization with limited deployment load. 303-308 - Yifeng Zhou, Jun Li, Louise Lamont:

Multilateration localization in the presence of anchor location uncertainties. 309-314 - Vahid Pourahmadi, Shahrokh Valaee:

Indoor positioning and distance-aware graph-based semi-supervised learning method. 315-320 - Donghyun Kim, Jiwoong Kim, Deying Li, Sung-Sik Kwon, Alade O. Tokuta:

On sleep-wakeup scheduling of non-penetrable barrier-coverage of wireless sensors. 321-327 - Yao-Tung Tsou, Chun-Shien Lu, Sy-Yen Kuo

:
Privacy- and integrity-preserving range query in wireless sensor networks. 328-334 - Xiaojing Liao, Jianzhong Li:

Privacy-preserving and secure top-k query in two-tier wireless sensor network. 335-341 - Shehla S. Rana, Nitin H. Vaidya:

A new 'Direction' for source location privacy in wireless sensor networks'. 342-347 - Kuan Zhang

, Xiaohui Liang
, Rongxing Lu, Xuemin Shen
, Hai Zhao:
VSLP: Voronoi-socialspot-aided packet forwarding protocol with receiver Location Privacy in MSNs. 348-353 - Jalel Ben-Othman

, Yesica Imelda Saavedra Benitez:
A new method to secure RA-OLSR using IBE. 354-358 - Wanlu Sun, Erik G. Ström

, Fredrik Brannstrom
, Debarati Sen:
Long-Term Clock Synchronization in wireless sensor networks with arbitrary delay distributions. 359-364 - Jonathan Shannon, Hugh Melvin, Antonio G. Ruzzelli:

Dynamic Flooding Time Synchronisation Protocol for WSNs. 365-371 - Zimu Yuan, Wei Li, Adam C. Champion, Wei Zhao

:
An efficient hybrid localization scheme for Heterogeneous Wireless Networks. 372-378 - Qiong Huo, Bo Dong, Subir Biswas:

A cellular pulse switching architecture for binary event sensing. 379-384 - Ehsan Vahedi, Rabab K. Ward, Ian F. Blake:

Analytical modeling of RFID Generation-2 protocol using absorbing Markov chain theorem. 385-390 - Kaouther Abrougui, Azzedine Boukerche, Yan Wang:

Secure gateway localization and communication system for vehicular ad hoc networks. 391-396 - Bora Karaoglu, Wendi Rabiner Heinzelman

:
A dynamic channel allocation scheme using spectrum sensing for mobile ad hoc networks. 397-402 - Amr A. El-Sherif

, Amr Mohamed
:
Delay minimization through joint routing and resource allocation in cognitive radio-based mesh networks. 403-409 - Narjes Torabi, Karim Rostamzadeh, Victor C. M. Leung

:
Rank-optimal channel selection strategy in cognitive networks. 410-415 - Bo Chai, Ruilong Deng

, Peng Cheng, Jiming Chen:
Energy-efficient power allocation in cognitive sensor networks: A game theoretic approach. 416-421 - Lu Wang

, Kaishun Wu
, Jiang Xiao, Mounir Hamdi
:
FCM: Frequency domain Cooperative sensing and Multi-channel contention for CRAHNs. 422-426 - Minming Ni, Zhangdui Zhong, Jianping Pan

, Dongmei Zhao, Ruifeng Chen:
Non-saturated performance analysis of IEEE 802.11 broadcast in 2-D mobile ad hoc networks. 427-432 - Duc Ngoc Minh Dang

, Nguyen Van Mui, Choong Seon Hong
, Sungwon Lee, Kwangsue Chung:
An Energy Efficient Multi-channel MAC Protocol for wireless ad hoc networks. 433-438 - Jian Zhen, Volkan Rodoplu:

Automated MAC protocol generation for dynamic topologies. 439-444 - Ahed Alshanyour, Anjali Agarwal:

IEEE 802.11 wireless LANs: Non-saturation queueing and delay analysis. 445-450 - Tae-Suk Kim, Taerim Park, Mo Sha

, Chenyang Lu:
Toward MAC Protocol Service over the air. 451-457 - Tao Yang, Guoqiang Mao

, Wei Zhang:
An upper bound on transmission capacity of wireless CSMA networks. 458-463 - Kassem Fawaz, Hassan Artail:

A two-layer cache replication scheme for dense mobile ad hoc networks. 464-469 - Fei Hao, Min Chen, Chunsheng Zhu, Mohsen Guizani:

Discovering influential users in micro-blog marketing with influence maximization mechanism. 470-474 - Stefania Colonnese

, Francesca Cuomo
, Tommaso Melodia
:
Leveraging Multiview Video Coding in clustered Multimedia Sensor networks. 475-480 - Qiang Wang, Pu Zhou, Jing Wu, Chengnian Long:

RaFFD: Resource-aware Fast Foreground Detection in embedded smart cameras. 481-486 - Tingpei Huang, Haiming Chen, Zhaoliang Zhang, Li Cui:

EasiPLED: Discriminating the causes of packet losses and errors in indoor WSNs. 487-493 - Mustapha Réda Senouci

, Abdelhamid Mellouk, Amar Aissani
:
An analysis of intrinsic properties of stochastic node placement in sensor networks. 494-499 - Soura Dasgupta, Guoqiang Mao

:
On the quality of wireless network connectivity. 500-505 - Thomas Bourgeois, Shigeru Shimamoto:

Accirate subgraph probabilities in a Random Geometric Graph and application to cooperative multihop ad-hoc networks. 506-511 - Fatih Senel, Mohamed F. Younis:

Optimized relay node placement for establishing connectivity in sensor networks. 512-517 - Izzet F. Senturk

, Kemal Akkaya, Fatih Senel:
An effective and scalable connectivity restoration heuristic for Mobile Sensor/Actor Networks. 518-523 - Huan Zhou, Hongyang Zhao, Jiming Chen:

Energy saving and network connectivity tradeoff in Opportunistic Mobile Networks. 524-529 - Felipe D. da Cunha

, Raquel A. F. Mini, Antonio Alfredo Ferreira Loureiro:
Sensor-MAC with Dynamic Duty Cycle in wireless sensor networks. 530-536 - Yanchao Xu, Chengyu Wu, Chen He, Lingge Jiang:

A cluster-based energy efficient MAC protocol for multi-hop cognitive radio sensor networks. 537-542 - Mustafa Alper Akkas, Ian F. Akyildiz, Radosveta Sokullu

:
Terahertz channel modeling of underground sensor networks in oil reservoirs. 543-548 - Torsten Andre, Günther Brandner, Nikolaj Marchenko, Christian Bettstetter:

Measurement-based analysis of cooperative relaying in an industrial wireless sensor network. 549-554 - Kien Nguyen

, Yusheng Ji:
Asynchronous MAC protocol with QoS awareness in wireless sensor networks. 555-559 - Sang Hoon Lee, Yong Soo Bae, Lynn Choi:

On-demand radio wave sensor for wireless sensor networks: Towards a zero idle listening and zero sleep delay MAC protocol. 560-566 - Nesrine Chakchouk, Bechir Hamdaoui:

QoS-aware autonomous distributed power control in co-channel femtocell networks. 567-571 - Liang Liang, Yu Ge

, Gang Feng, Wei Ni, Aung Aung Phyo Wai:
Experimental study on adaptive power control based routing in multi-hop Wireless Body Area Networks. 572-577 - Francisco Vazquez Gallego, Jesus Alonso-Zarate

, Luis Alonso:
Energy analysis of distributed neighbour discovery algorithms based on frame slotted-ALOHA for cooperative networks. 578-583 - Guobao Sun, Fan Wu, Xiaofeng Gao, Guihai Chen

:
PHED: Pre-Handshaking Neighbor Discovery Protocols in full duplex wireless ad hoc networks. 584-590 - Qianqian Yang, Shibo He, Junkun Li, Jiming Chen, Youxian Sun:

Energy-efficient probabilistic full coverage in wireless sensor networks. 591-596 - Jihene Rezgui, Soumaya Cherkaoui

:
Analytical transmit power adjustment in cooperative vehicle safety systems. 597-602 - Sheng Liu, Haojin Zhu

, Shuai Li, Xu Li, Cailian Chen, Xinping Guan:
An Adaptive Deviation-tolerant Secure Scheme for distributed cooperative spectrum sensing. 603-608 - Debasmit Banerjee, Mahmoud Taghizadeh, Subir Biswas:

Distributed TDMA for privacy sensitive anonymous networks. 609-615 - K. C. Ramalingam, Venkatachalam Subramanian, A. Selcuk Uluagac

, Raheem A. Beyah
:
SIMAGE: Secure and Link-Quality Cognizant Image Distribution for wireless sensor networks. 616-621 - Chao Yang, Jiannong Cao

, Xuefeng Liu, Lijun Chen, Daoxu Chen:
A high quality event capture scheme for WSN-based structural health monitoring. 622-627 - Qingquan Zhang, Ting Zhu, Yi Ping, Yu Gu:

Cooperative data reduction in wireless sensor network. 628-633 - Giuseppe Lo Re

, Fabrizio Milazzo
, Marco Ortolani
:
A distributed Bayesian approach to fault detection in sensor networks. 634-639 - Jianliang Gao, Jianxin Wang, Xi Zhang:

HMRF-based distributed fault detection for wireless sensor networks. 640-644 - Fei Che, Errol L. Lloyd, Jason O. Hallstrom, S. S. Ravi:

Topology control with a limited number of relays. 645-651 - Yatish K. Joshi, Mohamed F. Younis:

Autonomous recovery from multi-node failure in Wireless Sensor Network. 652-657 - Qi Zhang

, Rune Hylsberg Jacobsen, Thomas Skjødeberg Toftegaard:
Bio-inspired low-complexity clustering in large-scale dense wireless sensor networks. 658-663 - Tandra Chakraborty, Fazlay Rabbi, Aungon Nag Radon, Ashikur Rahman

:
Load and energy aware topology control in wireless ad-hoc networks. 664-669 - Amir Ehsani Zonouz, Navid Tadayon, Sonia Aïssa, Liudong Xing:

Design and evaluation of small-world wireless ad-hoc networks under rayleigh fading. 670-675 - Son N. Le, Michael Zuba, Zheng Peng

, Jun-Hong Cui, Jie Wang:
Deployment framework for mobile underwater wireless networks with node reuse. 676-682 - Lutful Karim, Qusay H. Mahmoud

, Nidal Nasser
, Nargis Khan:
LRSA: A multi-component Wireless Sensor Network management framework. 683-688 - Rahul Khanna

, Huaping Liu
:
Machine learning approach to data center monitoring using wireless sensor networks. 689-694 - Asitha U. Bandaranayake, Vaibhav Pandit, Dharma P. Agrawal:

LPBT: An energy-aware link quality metric for Wireless Mesh Networks. 695-701 - Chen Wang, Baoliu Ye, Xiaoliang Wang, Sanglu Lu:

Throughput capacity in mobile ad-hoc networks with correlated mobility and f-cast relay. 702-707 - Dylan Lexie, Shan Lin, Jie Wu:

Adaptive battery charge scheduling with bursty workloads. 708-713 - Lingjun Li, Xinxin Zhao, Guoliang Xue:

Searching in the dark: A framework for authenticating unknown users in online social networks. 714-719 - Hongxin Hu, Gail-Joon Ahn

, Jan Jorgensen:
Enabling Collaborative data sharing in Google+. 720-725 - Boyang Wang, Baochun Li, Hui Li:

Gmatch: Secure and privacy-preserving group matching in social networks. 726-731 - Linke Guo, Xinxin Liu, Yuguang Fang

, Xiaolin Li:
User-centric private matching for eHealth networks - A social perspective. 732-737 - Muyuan Li, Zhaoyu Gao, Suguo Du, Haojin Zhu

, Mianxiong Dong
, Kaoru Ota
:
PriMatch: Fairness-aware secure friend discovery protocol in mobile social network. 738-743 - Eleni Gessiou, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos, Sotiris Ioannidis:

Digging up social structures from documents on the web. 744-750 - Chin-Fu Ku, Kai-Hsiang Yang, Jan-Ming Ho:

An optimal scheduling for file dissemination under a full binary tree of trust relationship. 751-757 - Arash Nourian, Muthucumaru Maheswaran:

Using segmentation for confidentiality aware image storage and retrieval on clouds. 758-763 - Steven Zittrower, Cliff Changchun Zou:

Encrypted phrase searching in the cloud. 764-770 - Zhan Wang, Kun Sun, Sushil Jajodia

, Jiwu Jing:
Disk storage isolation and verification in cloud. 771-776 - Lin Ye, Hongli Zhang, Jiantao Shi

, Xiaojiang Du:
Verifying cloud Service Level Agreement. 777-782 - Kun Xie, Wen Chen:

Precoding strategy based on SLR for secure communication in MUME wiretap systems. 783-788 - Nan (Jonas) Yang

, Phee Lep Yeoh
, Maged Elkashlan, Robert Schober, Iain B. Collings
:
Secure transmission via transmit antenna selection in MIMO wiretap channels. 789-794 - Benjamin W. P. Ramsey, Michael A. Temple, Barry E. Mullins:

PHY foundation for multi-factor ZigBee node authentication. 795-800 - Young-Hyun Oh, David J. Thuente:

Enhanced security of random seed DSSS algorithms against seed jamming attacks. 801-806 - Ahmed Benfarah, Benoit Miscopein, Jean-Marie Gorce

:
Security embedding on UWB-IR physical layer. 807-812 - Fabian Lanze, Andriy Panchenko, Benjamin Braatz

, Andreas Zinnen:
Clock skew based remote device fingerprinting demystified. 813-819 - Gang Xu, Leonardo Aguilera, Yong Guan:

Pecan: A circuit-less P2P design for anonymity. 820-825 - Liang Wang, Jussi Kangasharju:

Real-world sybil attacks in BitTorrent mainline DHT. 826-832 - Chenglong Li, Yibo Xue, Yingfei Dong, Dongsheng Wang:

Relay recommendation system (RRS) and selective anonymity for tor. 833-838 - Martin C. Carlisle

, Barry S. Fagin:
IRONSIDES: DNS with no single-packet denial of service or remote code execution vulnerabilities. 839-844 - Xiaobo Ma, Jianfeng Li, Jing Tao, Xiaohong Guan:

Towards active measurement for DNS query behavior of botnets. 845-849 - Hani Ragab Hassen, Olga Jones, Nikos Galanis:

Rabit: A reputation architecture for BitTorrent. 850-855 - Yahya S. Khiabani, Shuangqing Wei, Jian Yuan, Jian Wang:

Linear cryptanalysis against block ciphered system under noisy ciphertexts. 856-861 - Jianhua Mo

, Xiawen Xiao, Meixia Tao, Nanrun Zhou:
Hash function mapping design utilizing probability distribution for pre-image resistance. 862-867 - Amerah Alabrah, Mostafa A. Bassiouni:

A hierarchical two-tier one-way hash chain protocol for secure internet transactions. 868-873 - Miodrag J. Mihaljevic:

An approach for light-weight encryption employing dedicated coding. 874-880 - Mohsen Zareian, Ali Daneshkhah

:
Adaptive angle quantization index modulation for robust image watermarking. 881-884 - Qiang Li, Dengguo Feng, Liwu Zhang:

An attribute based encryption scheme with fine-grained attribute revocation. 885-890 - Fahim H. Abbasi, Richard J. Harris, Giovanni S. Moretti, Aun Haider, Nafees Anwar:

Classification of malicious network streams using honeynets. 891-897 - Khalid Alsubhi, Mohamed Faten Zhani

, Raouf Boutaba:
Embedded Markov process based model for performance analysis of Intrusion Detection and Prevention Systems. 898-903 - Yehoshua Gev, Moti Geva, Amir Herzberg

:
Backward traffic throttling to mitigate bandwidth floods. 904-910 - M. H. R. Khouzani, Soumya Sen, Ness B. Shroff:

Managing the adoption of asymmetric bidirectional firewalls: Seeding and mandating. 911-916 - Rui Ferreira, Rui L. Aguiar

:
Breaching location privacy in XMPP based messaging. 917-922 - Zesheng Chen, Chao Chen

:
Heterogeneity in vulnerable hosts slows down worm propagation. 923-928 - Hongwei Li, Xiaohui Liang

, Rongxing Lu, Xiaodong Lin, Xuemin Shen
:
EDR: An efficient demand response scheme for achieving forward secrecy in smart grid. 929-934 - Yihai Zhu, Yan Sun, Haibo He:

Load distribution vector based attack strategies against power grid systems. 935-941 - Asaad Kaadan, Hazem H. Refai:

Securing wireless medical devices. 942-948 - Yan Zhu

, Shan-Biao Wang, Di Ma
, Hongxin Hu, Gail-Joon Ahn
:
Secure and efficient constructions of hash, MAC and PRF for mobile devices. 949-954 - Muhammad N. Sakib, Chin-Tser Huang:

Textact: A text-action based web authentication scheme. 955-960 - Tao Qin, Wei Li, Xiaohong Guan, Zhaoli Liu:

Behavior spectrum: An effective method for user's web access behavior monitoring and measurement. 961-966 - Marcin Niemiec

, Andrzej R. Pach
:
The measure of security in quantum cryptography. 967-972 - João Almeida, Saurabh Shintre, Mate Boban

, João Barros
:
Probabilistic key distribution in vehicular networks with infrastructure support. 973-978 - Sasi Kiran V. L. Reddy, Sushmita Ruj, Amiya Nayak

:
Distributed data survivability schemes in mobile Unattended Wireless Sensor Networks. 979-984 - Jun Zhou, Zhenfu Cao:

TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular Delay Tolerant Networks. 985-990 - Ikechukwu Azogu, Michael T. Ferreira, Hong Liu:

A security metric for VANET content delivery. 991-996 - Weihan Goh, Chai Kiat Yeo

:
Threat mitigation in tactical-level disruption tolerant networks. 997-1003 - Sanaa Taha, Xuemin Shen

:
A link-layer authentication and key agreement scheme for mobile public hotspots in NEMO based VANET. 1004-1009 - Konstantinos Pelechrinis, Prashant Krishnamurthy, Christos Gkantsidis:

Towards a trustworthy PF scheduler for cellular data networks. 1010-1016 - Jin Cao, Maode Ma, Hui Li:

A group-based authentication and key agreement for MTC in LTE networks. 1017-1022 - Andrew Cheng, Qiao Li, Rohit Negi:

Towards a secure fair MAC in wireless ad hoc networks using trusted computing technology. 1023-1028 - Xiaowei Li

, Yuqing Zhang, Xuefeng Liu, Jin Cao, Qianqian Zhao:
A lightweight roaming authentication protocol for anonymous wireless communication. 1029-1034 - Xinghua Li, Jianfeng Ma, Yulong Shen:

An efficient WLAN initial access authentication protocol. 1035-1040 - Daniel Migault, Daniel Palomares, Emmanuel Herbert, Wei You, Gabriel Ganne, Ghada Arfaoui

, Maryline Laurent
:
ISP Offload Infrastructure to minimize cost and time deployment. 1041-1047 - Cankut Orakcal, David Starobinski:

Jamming-resistant rate control in Wi-Fi networks. 1048-1053 - Andrey Garnaev, Wade Trappe, Chun-Ta Kung:

Dependence of optimal monitoring strategy on the application to be protected. 1054-1059 - Juan Camilo Corena, Tomoaki Ohtsuki

:
Thwarting Diversity Attacks in wireless network coding using threshold signatures and a sender-centered approach. 1060-1065 - Jian Li, Chao Yang, Di Tang, Tongtong Li, Jian Ren:

Characterization of linear network coding for pollution detection. 1066-1071 - Hyoungsuk Jeon, Steven W. McLaughlin, Jeongseok Ha:

Secure communications with untrusted secondary users in cognitive radio networks. 1072-1078 - Subir Biswas, Jelena V. Misic, Vojislav B. Misic:

DDoS attack on WAVE-enabled VANET through synchronization. 1079-1084 - Miao Pan, Yan Long, Hao Yue

, Yuguang Fang
, Hongyan Li:
Multicast throughput optimization and fair spectrum sharing in cognitive radio networks. 1085-1089 - Pavol Polacek, Chih-Wei Huang:

Rateless code based opportunistic multicasting over cognitive radio networks. 1090-1096 


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID