Journal: Computer Communications

Volume 31, Issue 18

4232 -- 4233Jong Hyuk Park, Hsiao-Hwa Chen, Antonio Coronato, Gerd Kortuem. Secure multi-mode systems and their applications for pervasive computing
4234 -- 4241Marie-Luce Bourguet. Handling uncertainty in multimodal pervasive computing applications
4242 -- 4247Antonio Coronato, Giuseppe De Pietro. Middleware mechanisms for supporting multimodal interactions in smart environments
4248 -- 4254Soo-Young Kang, Deok-Gyu Lee, Im-Yeong Lee. A study on secure RFID mutual authentication scheme in pervasive computing environment
4255 -- 4258Chun-Ta Li, Min-Shiang Hwang, Yen-Ping Chu. Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments
4259 -- 4268Chi-Yuan Chen, Tin Yu Wu, Yueh-Min Huang, Han-Chieh Chao. An efficient end-to-end security mechanism for IP multimedia subsystem
4269 -- 4280Rabia Riaz, Ayesha Naureen, Attiya Akram, Ali Hammad Akbar, Ki-Hyung Kim, H. Farooq Ahmed. A unified security framework with three key management schemes for wireless sensor networks
4281 -- 4293Sheikh Iqbal Ahamed, Moushumi Sharmin. A trust-based secure service discovery (TSSD) model for pervasive computing
4294 -- 4303Bo Sun, Yang Xiao, Chung-Chih Li, Hsiao-Hwa Chen, T. Andrew Yang. Security co-existence of wireless sensor networks and RFID for pervasive computing
4304 -- 4311Chih-Hsiung Tseng, Sheng-Tzong Cheng. Location management scheme with WLAN positioning algorithm for integrated wireless networks
4312 -- 4323Valentina Casola, Emilio Pasquale Mancini, Nicola Mazzocca, Massimiliano Rak, Umberto Villano. Self-optimization of secure web services
4324 -- 4332Guorui Li, Jingsha He, Yingfang Fu. Group-based intrusion detection system in wireless sensor networks
4333 -- 4342Markos P. Anastasopoulos, A. C. Voulkidis, Athanasios V. Vasilakos, Panayotis G. Cottis. A secure network management protocol for SmartGrid BPL networks: Design, implementation and experimental results
4343 -- 4351Azzedine Boukerche, Yonglin Ren. A trust-based security system for ubiquitous and pervasive computing environments
4352 -- 4359Bo-Chao Cheng, Huan Chen, Yi-Jean Li, Ryh-Yuh Tseng. A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks
4360 -- 4366Xuefeng Liang, Naixue Xiong, Laurence Tianruo Yang, Hui Zhang, Jong Hyuk Park. A compensation scheme of fingerprint distortion using combined radial basis function model for ubiquitous services
4367 -- 4375Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih Li. Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
4376 -- 4382Zhiyong Yu, Xingshe Zhou, Zhiwen Yu, Jong Hyuk Park, Jianhua Ma. iMuseum: A scalable context-aware intelligent museum system