Journal: Computer Communications

Volume 31, Issue 4

655 -- 658Sudip Misra, Subhas C. Misra, Isaac Woungang. Algorithmic and theoretical aspects of wireless ad hoc and sensor networks
659 -- 667Xuefei Cao, Weidong Kou, Lanjun Dang, Bin Zhao. IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
668 -- 698Stefano Basagni, Chiara Petrioli, Roberto Petroccia. Efficiently reconfigurable backbones for wireless sensor networks
699 -- 707Sangho Yi, Hong Min, Yookun Cho, Jiman Hong. Molecule: An adaptive dynamic reconfiguration scheme for sensor operating systems
708 -- 721Hadi Otrok, Noman Mohammed, Lingyu Wang, Mourad Debbabi, Prabir Bhattacharya. A game-theoretic intrusion detection model for mobile ad hoc networks
722 -- 733P. Venkata Krishna, N. Ch. S. N. Iyengar, Sudip Misra. An efficient Hash Table-Based Node Identification Method for bandwidth reservation in hybrid cellular and ad-hoc networks
734 -- 749Frederik Armknecht, Dirk Westhoff, Joao Girão, Alban Hessler. A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing
750 -- 759Chor Ping Low, Can Fang, Jim Mee Ng, Yew Hock Ang. Efficient Load-Balanced Clustering Algorithms for wireless sensor networks
760 -- 769Prayag Narula, Sanjay Kumar Dhurandher, Sudip Misra, Isaac Woungang. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
770 -- 781Jacques M. Bahi, Abdallah Makhoul, Ahmed Mostefaoui. Localization and coverage for high density sensor networks
782 -- 792Xianren Wu, Hamid R. Sadjadpour, J. J. Garcia-Luna-Aceves. Modeling of topology evolutions and implication on proactive routing overhead in MANETs
793 -- 806Biswajit Panja, Sanjay Kumar Madria, Bharat K. Bhargava. A role-based access in a hierarchical sensor network architecture to provide multilevel security
807 -- 817Alaa Eddien Abdallah, Thomas Fevens, Jaroslav Opatrny. High delivery rate position-based routing algorithms for 3D ad hoc networks
818 -- 826Somanath Tripathy, Sukumar Nandi. Defense against outside attacks in wireless sensor networks
827 -- 841Stéphane Maag, Cyril Grepet, Ana R. Cavalli. A formal validation methodology for MANET routing protocols based on nodes self similarity
842 -- 857Huirong Fu, Satoshi Kawamura, Ming Zhang, Liren Zhang. Replication attack on random key pre-distribution schemes for wireless sensor networks