Abstract is missing.
- Attack-Resilient Random Key Distribution Scheme for Distributed Sensor NetworksFirdous Kausar, Sajid Hussain, Tai-Hoon Kim, Ashraf Masood. 1-11 [doi]
- A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying AssumptionsMaria Karyda, Stefanos Gritzalis, Jong Hyuk Park. 12-21 [doi]
- The Case Study of Information Security System for International AirportsHangbae Chang, Moonoh Kim, Hyuk-jun Kwon, Byungwan Han. 22-30 [doi]
- Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-Markov Cost ModelsToshikazu Uemura, Tadashi Dohi. 31-42 [doi]
- An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID SystemN. W. Lo, Kuo-Hui Yeh. 43-56 [doi]
- UPS - An Ubiquitous Proximity eService for Trust CollaborationYuanchu Hwang, Soe-Tsyr Yuan. 57-68 [doi]
- Obligations for Privacy and Confidentiality in Distributed TransactionsUche M. Mbanaso, G. S. Cooper, David W. Chadwick, Anne Anderson. 69-81 [doi]
- Multi-channel Enhancements for IEEE 802.11-Based Multi-hop Ad-Hoc Wireless NetworksYongsuk Lee, WoongChul Choi, SukJoong Kang, Seongje Cho. 82-92 [doi]
- An Intelligent Event-Driven Interface Agent for Interactive Digital Contents in Ubiquitous EnvironmentsSukhoon Kang, Seokhoon Bae. 93-102 [doi]
- A Loop-Based Key Management Scheme for Wireless Sensor NetworksYingZhi Zeng, BaoKang Zhao, Jinshu Su, Xia Yan, Zili Shao. 103-114 [doi]
- A MAC Protocol with Little Idle Listening for Wireless Sensor NetworksChaoguang Men, Yongqian Lu, Dongsheng Wang. 115-123 [doi]
- Security Technologies Based on Home Gateway for Making Smart Home SecureGeon Woo Kim, Deok-Gyu Lee, Jong-Wook Han, Sang-Wook Kim. 124-135 [doi]
- Layered Peer to Peer Streaming Using Hidden Markov ModelsSheng-De Wang, Zheng Yi Huang. 136-145 [doi]
- Optimum Power Controller for Random Number Generator in the Crypto Module of Ubiquitous Computing EnvironmentJinkeun Hong, Kihong Kim. 146-157 [doi]
- Problem Localization for Automated System Management in Ubiquitous ComputingShunshan Piao, Jeongmin Park, Eunseok Lee. 158-168 [doi]
- A High Speed Analog to Digital Converter for Ultra Wide Band ApplicationsAnand Mohan, Aladin Zayegh, Aleksandar Stojcevski. 169-180 [doi]
- Design and DSP Software Implementation of Mobile WiMAX Baseband Transceiver FunctionsHai-wei Wang, David W. Lin, Kun-Chien Hung, Youn-Tai Lee. 181-192 [doi]
- Cross-Layer Design for IEEE 802.16-2005 System Using Platform-Based MethodologiesLi-chuan Tseng, Kuan-yin Chen, ChingYao Huang. 193-204 [doi]
- A Dynamic Frequency Allocation Scheme for IEEE 802.16 OFDMA-Based WMANs Using Hungary AlgorithmShiann-Tsong Sheu, Chih-Chen Yang, Hsu-Sheng Chang. 205-214 [doi]
- Wireless Network Management System for WiMAX / Wi-Fi Mesh NetworksLi-Der Chou, Shih-Yao Cheng, Chien-Yi Li, Shing-Kuang Chen. 215-225 [doi]
- An Implementation of QoS Framework for Heterogeneous NetworksChang-Yang Ho, Hsi-Lu Chao. 226-236 [doi]
- An Energy-Efficient MAC Design for IEEE 802.15.4-Based Wireless Sensor NetworksYu-Kai Huang, Sze-Wei Huang, Ai-Chun Pang. 237-248 [doi]
- A Cross-Layer Signaling and Middleware Platform for Multi-interface Mobile DevicesYung-Chien Shih, Kai-Cheng Hsu, Chien-Chao Tseng. 249-260 [doi]
- Enhanced Sleep Mode Operations for Energy Saving in IEEE 802.16eSixian Zheng, Kuochen Wang, Shiao Li Tsao, Pochun Lin. 261-272 [doi]
- Enhanced Fingerprint-Based Location Estimation System in Wireless LAN EnvironmentWilson M. Yeung, JunYang Zhou, Joseph K. Ng. 273-284 [doi]
- Improving Channel Scanning Procedures for WLAN HandoffsShiao Li Tsao, Ya-Lien Cheng. 285-296 [doi]
- A Multicast Extension for Enhanced Mobile IP by Home Agent HandoverChun-Chuan Yang, Jeng-Yueng Chen, Li-Sheng Yu. 297-308 [doi]
- Autonomic Multi-server Distribution in Flash Crowds Alleviation NetworkMerdan Atajanov, Toshihiko Shimokawa, Norihiko Yoshida. 309-320 [doi]
- Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless NetworksChao-Lieh Chen, Jeng-Wei Lee, Cheng-Zh Lin, Yi-Tsung Chen, Jar-Shone Ker, Yau-Hwang Kuo. 321-332 [doi]
- Description of a New Feature Meta-modelYu Song, Qi Chen. 333-340 [doi]
- Studying of Multi-dimensional Based Replica Management in Object Storage SystemZhipeng Tan, Dan Feng, Fei He, Ke Zhou. 341-354 [doi]
- Communication Model Exploration for Distributed Embedded Systems and System Level InterpretationsTakashi Kinoshima, Kazutaka Kobayashi, Nurul Azma Zakaria, Masahiro Kimura, Noriko Matsumoto, Norihiko Yoshida. 355-364 [doi]
- An End-to-End QoS Adaptation Architecture for the Integrated IntServ and DiffServ NetworksIng-Chau Chang, Shi Feng Chen. 365-376 [doi]
- Ubiquitous Laboratory: A Research Support Environment for Ubiquitous Learning Based on Sensor NetworksMianxiong Dong, Kaoru Ota, Minyi Guo, Zixue Cheng. 377-388 [doi]
- Intelligent Monitoring Using Wireless Sensor NetworksSenol Zafer Erdogan, Sajid Hussain, Jong Hyuk Park. 389-400 [doi]
- On the Design of Micro-mobility for Mobile NetworkJunn-Yen Hu, Cheng-Fu Chou, Min-Shi Sha, Ing-Chau Chang, Chung-Yi Lai. 401-412 [doi]
- ANSWER: Adaptive Network Selection in WLAN/UMTS EnviRonmentChih-Cheng Hsu, Ming-Hung Chen, Cheng-Fu Chou, Wei-Chieh Chi, Chung-Yi Lai. 413-424 [doi]
- Self-authorized Public Key Management for Home NetworksHyoungshick Kim, S. Jae Oh. 425-434 [doi]
- A Cross-Layered Diagnostician in OSGi Platform for Home NetworkPang-Chieh Wang, Yi-Hsuan Hung, Ting-Wei Hou. 435-444 [doi]
- LaMSM: Localization Algorithm with Merging Segmented Maps for Underwater Sensor NetworksEunchan Kim, Seok Woo, Chungsan Kim, Kiseon Kim. 445-454 [doi]
- TinyOS-Based Gateway for Underwater Acoustics/Radio Frequency CommunicationPhil-Jung Yun, Changhwa Kim, Sangkyung Kim, Seungjae Lee, Yong-Man Cho. 455-466 [doi]
- An Energy Scheduling Algorithm for Ensuring the Pre-determined Lifetime in Sensor NetworkYong-Man Cho, Seungjae Lee, Changhwa Kim, Sangkyung Kim. 467-473 [doi]
- Underwater Acoustic Communication and Modem-Based Navigation AidsDale Green. 474-481 [doi]
- State-of-the-Art in MAC Protocols for Underwater Acoustics Sensor NetworksHung Trong Nguyen, Soo Young Shin, Soo-Hyun Park. 482-493 [doi]
- An Ultrasonic Sensor Based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor NetworksHeungwoo Nam, Sunshin An. 494-504 [doi]
- UWA-NAV - Energy Efficient Error Control Scheme for Underwater Acoustic Sensor NetworkSoo Young Shin, Soo-Hyun Park. 505-514 [doi]
- Underwater Wideband Source Localization Using the Interference Pattern MatchingSeung-Yong Chun, Se-Young Kim, Ki-Man Kim. 515-522 [doi]
- A New Virtual Select Database Operation for Wireless Sensor NetworksSeungjae Lee, Changhwa Kim, Sangkyung Kim. 523-530 [doi]
- GT:::2::: - Reduced Wastes Time Mechanism for Underwater Acoustic Sensor NetworkSoo Young Shin, Soo-Hyun Park. 531-537 [doi]
- Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID NetworksJihoon Choi, Wonjun Lee. 538-549 [doi]
- An Efficient Mutual Authentication Protocol on RFID TagsHui-Feng Huang. 550-556 [doi]
- HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID SystemJaeCheol Ha, Hwankoo Kim, JeaHoon Park, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd. 557-567 [doi]
- Target Classification in Sparse Sampling Acoustic Sensor Networks Using IDDC AlgorithmYoungsoo Kim, Daeyoung Kim, Taehong Kim, Jongwoo Sung, Seongeun Yoo. 568-578 [doi]
- Scriptable Sensor Network Based Home-AutomationThomas Haenselmann, Thomas King, Marcel Busse, Wolfgang Effelsberg, Markus Fuchs. 579-591 [doi]
- Applying Situation Awareness to Mobile Proactive Information DeliverySu Te Lei, Kang Zhang, Edwin Hsing-Mean Sha. 592-603 [doi]
- Energy-Efficiency on a Variable-Bitrate DeviceYung-Hen Lee, Jian-Jia Chen, Tei-Wei Kuo. 604-616 [doi]
- The Secure DAES Design for Embedded System ApplicationMing-Haw Jing, Jian-Hong Chen, Zih-Heng Chen, Yaotsu Chang. 617-626 [doi]
- Software Power Peak Reduction on Smart Card Systems Based on Iterative CompilingMatthias Grumer, Manuel Wendt, Stefan Lickl, Christian Steger, Reinhold Weiss, Ulrich Neffe, Andreas Mühlberger. 627-637 [doi]
- Simultaneous Operation Scheduling and Operation Delay Selection to Minimize Cycle-by-Cycle Power DifferentialWei-Ting Yen, Shih-Hsu Huang, Chun-Hua Cheng. 638-647 [doi]
- A Simple Approach to Robust Optimal Pole Assignment of Decentralized Stochastic Singularly-Perturbed Computer Controlled SystemsKai-chao Yao. 648-659 [doi]
- Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed SystemsBinoy Ravindran, Edward Curley, Jonathan Stephen Anderson, E. Douglas Jensen. 660-673 [doi]
- Evaluating Modeling Solutions on Their Ability to Support the Partitioning of Automotive Embedded SystemsAugustin Kebemou, Ina Schieferdecker. 674-685 [doi]
- Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006Je Hong Park, Bo Gyeong Kang. 686-691 [doi]
- New Efficient Certificateless Signature SchemeLei Zhang, Futai Zhang, Fangguo Zhang. 692-703 [doi]
- A Practical Identity-Based Signature Scheme from Bilinear MapZhu Wang, Huiyan Chen. 704-715 [doi]
- Linkable Ring Signatures from Linear Feedback Shift RegisterDong Zheng, Xiangxue Li, Kefei Chen, Jianhua Li. 716-727 [doi]
- A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss ProblemRen-Chiun Wang, Wen-Shenq Juang, Chin-Laung Lei. 728-744 [doi]
- A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor NetworksFirdous Kausar, Sajid Hussain, Jong Hyuk Park, Ashraf Masood. 745-757 [doi]
- Token-Based Authenticated Key Establishment Protocols for Three-Party CommunicationEun-Jun Yoon, Kee-Young Yoo. 758-769 [doi]
- Two Approaches on Pairwise Key Path Establishment for Sensor NetworksPing Li, Yaping Lin, Jiaying Wu. 770-780 [doi]
- An Efficient Authentication Protocol for RFID Systems Resistant to Active AttacksPedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda. 781-794 [doi]
- Low-Cost and Strong-Security RFID Authentication ProtocolJaeCheol Ha, Sang-Jae Moon, Juan Manuel González Nieto, Colin Boyd. 795-807 [doi]
- A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 DomainIlsun You. 808-819 [doi]