Journal: Wireless Personal Communications

Volume 85, Issue 1

1 -- 7Homero Toral-Cruz, Albena D. Mihovska, Miroslav Voznak, Kamaljit I. Lakhtaria, Robert Bestak. Research Trends and Challenges for Network-Based ICT Systems
9 -- 27Chia-Hung Wei, Ray-Guang Cheng, You-Shin Lin. Analysis of Slotted-Access-Based Channel Access Control Protocol for LTE-Advanced Networks
29 -- 48Pengbo Si, F. Richard Yu, Ruizhe Yang, Yanhua Zhang. Navigation Data-Assisted Opportunistic Spectrum Scheduling for Network-Based UAV Systems: A Parallel Restless Bandits Formulation
49 -- 62Mindaugas Kurmis, Arunas Andziulis, Dale Dzemydiene, Sergej Jakovlev, Miroslav Voznak, Gediminas Gricius. Cooperative Context Data Acquisition and Dissemination for Situation Identification in Vehicular Communication Networks
63 -- 76Filip Rezac, Miroslav Voznak, Karel Tomala. Voice Messaging System as a Form of Distribution of an Urgent Information
77 -- 99Al-Sakib Khan Pathan, Mohssen M. Z. E. Mohammed. Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body
101 -- 136Slavyana Kasabova, Miroslav Gechev, Vladislav Vasilev, Albena Mihovska, Vladimir Poulkov, Ramjee Prasad. On Modeling the Psychology of Wireless Node Interactions in the Context of Internet of Things
137 -- 149Stanislav Klucik, Erik Chromy, Ivan Baronak. Model to Increase the Number of Output States of a Random Variable Using a Histogram Based PDF
151 -- 177Djallel Eddine Boubiche, Azeddine Bilami, Sabrina Boubiche, Faouzi Hidoussi. A Cross-Layer Communication Protocol with Transmission Power Adjustment for Energy Saving in Multi-hop MhWSNs
179 -- 205Aarti Jain, B. V. Ramana Reddy. Ant Colony Optimization Based Orthogonal Directional Proactive-Reactive Routing Protocol for Wireless Sensor Networks
207 -- 224Faouzi Hidoussi, Homero Toral-Cruz, Djallel Eddine Boubiche, Kamaljit I. Lakhtaria, Albena Mihovska, Miroslav Voznak. Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks
225 -- 240Baojun Huang, Muhammad Khurram Khan, Libing Wu, Fahad T. Bin Muhaya, Debiao He. An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography
241 -- 261David Deebak Bakkiam, Rajappa Muthaiah, Karupuswamy Thenmozhi, Pitchai Iyer Swaminathan. A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System
263 -- 288Xiong Li, Junguo Liao, Saru Kumari, Wei Liang, Fan Wu, Muhammad Khurram Khan. A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design
289 -- 304Rafael Martínez-Peláez, Homero Toral-Cruz, Joel Ruiz, Pablo Velarde-Alvarado. P2PM-pay: Person to Person Mobile Payment Scheme Controlled by Expiration Date
305 -- 323P. Karthigaikumar, N. Anitha Christy, N. M. Siva Mangai. PSP CO2: An Efficient Hardware Architecture for AES Algorithm for High Throughput