Abstract is missing.
- Anonymous Identity-Based Encryption with Distributed Private-Key Generator and Searchable EncryptionAmar Siad. 1-8 [doi]
- Energy Load Balancing for Fixed Clustering in Wireless Sensor NetworksSyed Amjad Ali, Cüneyt Sevgi. 1-5 [doi]
- Content-Aware Rate Control for Video Transmission with Buffer Constraints in Multipath NetworksMohammad Hassan Hajiesmaili, Ali Sehati, Ahmad Khonsari. 1-5 [doi]
- Experiments on the RSSI as a Range Estimator for Indoor LocalizationNdeye Amy Dieng, Claude Chaudet, Maurice Charbit, Laurent Toutain, Tayeb Ben Meriem. 1-5 [doi]
- Distributed Medium Access Scheduling for Wireless LANsDongho Kwak, Hyeonmok Ko, Cheeha Kim. 1-5 [doi]
- Global versus Local Re-Association Approach to Extend the Lifetime of Large-Scale IEEE 802.15.4/ZigBee Wireless Sensor NetworksZayneb Trabelsi Ayoub, Sofiane Ouni, Farouk Kamoun. 1-5 [doi]
- Real-Life Performance Analysis of Always-Best-Connected NetworkJari Kellokoski, Joonas Koskinen, Timo Hämäläinen 0002. 1-5 [doi]
- A Novel Indirect Trust Based Link State Routing Scheme Using a Robust Route Trust Method for Wireless Sensor NetworksArnab Raha, Mrinal Kanti Naskar, Arpita Chakraborty, Omar Alfandi, Dieter Hogrefe. 1-5 [doi]
- Multi-Party Trust Computation in Decentralized EnvironmentsTassos Dimitriou, Antonis Michalas. 1-5 [doi]
- Address Allocation Scheme to Improve Lifetime of IPv6 Cluster-Based WSNsLeila Ben Saad, Bernard Tourancheau. 1-5 [doi]
- Cache Attacks: An Information and Complexity Theoretic ApproachErkay Savas, Cemal Yilmaz. 1-7 [doi]
- Opportunistic Relay Selection for Wireless Cooperative NetworkTauseef Jamal, Paulo Mateus Mendes, André Zúquete. 1-4 [doi]
- Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF(2k)Zoya Dyka, Peter Langendoerfer, Frank Vater, Steffen Peter. 1-6 [doi]
- Implementation and Benchmarking of CUSUM Algorithm for Spectrum Sensing under Low SNR Regimes on ANRC Cognitive Radio TestbedRamachandra Budihal, Hirisave S. Jamadagni. 1-6 [doi]
- Improving the Resistance to Side-Channel Attacks on Cloud Storage ServicesOlivier Heen, Christoph Neumann, Luis Montalvo, Serge Defrance. 1-5 [doi]
- Key Management Scheme for Routing in Clustered Heterogeneous Sensor NetworksKanwalinderjit Kaur Gagneja, Kendall E. Nygard. 1-5 [doi]
- Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness AnalysisRaja Naeem Akram, Konstantinos Markantonakis, Keith Mayes. 1-7 [doi]
- Comparison of Messaging Protocols for Emerging Wireless NetworksJiva N. Bagale, John P. T. Moore, Antonio D. Kheirkhahzadeh, Peter Komisarczuk. 1-5 [doi]
- Integral Federated Identity Management for Cloud ComputingMaicon Stihler, Altair Olivo Santin, Arlindo L. Marcon Jr., Joni da Silva Fraga. 1-5 [doi]
- SCOUT: Social Context-Aware Ubiquitous SystemDania Abed Rabbou, Abderrahmen Mtibaa, Khaled A. Harras. 1-6 [doi]
- Fingerprinting Seismic Activity across an Internet of ThingsJohn P. T. Moore, Jiva N. Bagale, Antonio D. Kheirkhahzadeh, Peter Komisarczuk. 1-6 [doi]
- On the Performance of MANETs under Different Mobility Patterns and Routing Protocols and Its Improvement Based on Fixed Relay NodesMouna Abdelmoumen, Imen Arfaoui, Mounir Frikha, Tijani Chahed. 1-5 [doi]
- Multi-Agent Systems Negotiation Approach for Handoff in Mobile Cognitive Radio NetworksEmna Trigui, Moez Esseghir, Leïla Merghem-Boulahia. 1-5 [doi]
- An Emulated Test Framework for Service Discovery and MANET Research Based on ns-3Magnus Skjegstad, Frank T. Johnsen, Jørgen Nordmoen. 1-5 [doi]
- Refining a Quantitative Information Flow MetricSari Haj Hussein. 1-7 [doi]
- TASAM - Towards the Smart Devices App-Stores Applications Security Management Related Best PracticesZafar Kazmi, Toni Felguera, Jorge Aguila Vila, Mario Maawad Marcos. 1-5 [doi]
- Phase Adjustment in HS-SFN for HSDPAAleksandr Puchko, Mikhail Zolotukhin, Vesa Hytönen, Thomas Höhne, Thomas Chapman. 1-5 [doi]
- Security Aspects of Policy Controlled Cognitive RadioGianmarco Baldini, Valentin Rakovic, Vladimir Atanasovski, Liljana Gavrilovska. 1-5 [doi]
- ABLA: Angle-Based Location Advertisement for Location-Based Ad-Hoc Routing ProtocolsHiroaki Higaki. 1-5 [doi]
- Dethroning Transport Layer Security in the Embedded WorldSebastian Unger, Stefan Pfeiffer, Dirk Timmermann. 1-5 [doi]
- Self-Timed Physically Unclonable FunctionsJulian P. Murphy, Máire O'Neill, Frank P. Burns, Alexandre V. Bystrov, Alexandre Yakovlev, Basel Halak. 1-5 [doi]
- Architectural Optimizations & Hardware Implementations of WLANs Encryption StandardNicolas Sklavos, Paris Kitsos. 1-5 [doi]
- On Clock Frequency Effects in Side Channel Attacks of Symmetric Block CiphersQizhi Tian, Sorin A. Huss. 1-5 [doi]
- Relay Power Minimization Approach Based on General-Rank Beamforming for Multi-Antenna Relaying SchemesSeyed Mostafa Rezvani, Seyed Hamid Safavi, Ramezan Ali Sadegh Zadeh, Afrooz Haghbin, Reyhaneh Davarpanah. 1-5 [doi]
- Cross Layer MAC and PHY Architecture for Collision Correction of DSRC Safety MessagesWilliam G. Cassidy, Nabih Jaber, Kemal E. Tepe. 1-5 [doi]
- Energy-Efficient Clustering Algorithm for Wireless Sensor Networks Using the Virtual Field ForceAsmaa Seyam, Fahed Hasan Awad, Eyad Salah Taqieddin. 1-5 [doi]
- Reliable and Scalable Distributed Hash Tables Harnessing Hyperbolic CoordinatesTelesphore Tiendrebeogo, Daouda Ahmat, Damien Magoni. 1-6 [doi]
- Power Consumption Analysis of the Always-Best-Connected User EquipmentJari Kellokoski, Joonas Koskinen, Timo Hämäläinen 0002. 1-5 [doi]
- GlobeTraff: A Traffic Workload Generator for the Performance Evaluation of Future Internet ArchitecturesKonstantinos V. Katsaros, George Xylomenos, George C. Polyzos. 1-5 [doi]
- Towards a Generic Framework for Wireless Sensor Network Multi-Criteria RoutingNabil Sahli, Nafaâ Jabeur, Ijaz Muhammad Khan, Mohamad Badra. 1-6 [doi]
- Multi Path Considerations for Anonymized Routing: Challenges and OpportunitiesHasan T. Karaoglu, Mehmet Burak Akgun, Mehmet Hadi Günes, Murat Yuksel. 1-5 [doi]
- Distributed Shared Memory as an Approach for Integrating WSNs and Cloud ComputingPeter Langendörfer, Krzysztof Piotrowski, Manuel Díaz, Bartolomé Rubio. 1-6 [doi]
- Vehicular Broadcast Messaging Reliability Enhancement Protocol for Emergency Vehicle CommunicationsNabih Jaber, William G. Cassidy, Esam Abdel-Raheem, Kemal E. Tepe. 1-4 [doi]
- Energy Efficient Resource Allocation and Deployment Strategies for Wireless NetworksTafzeel ur Rehman Ahsin, Slimane Ben Slimane. 1-5 [doi]
- A Model for Privacy and Security Risks AnalysisEbenezer Paintsil. 1-8 [doi]
- Wireless Sensor Network Redeployment under the Target Coverage ConstraintDimitrios Zorbas, Tahiry Razafindralambo. 1-5 [doi]
- A Relay Deployment Mechanism for One Scenario of Cost-Effective Coverage Extension in IEEE 802.16j NetworksMikhail Zolotukhin, Timo Hämäläinen 0002, Andrey Garnaev. 1-6 [doi]
- Prospects for WLAN in the Evolved Packet Core EnvironmentSandra Frei, Woldemar F. Fuhrmann, Andreas Rinkel, Bogdan V. Ghita. 1-5 [doi]
- Demystifying Link Congestion in 4G-LTE Backhaul Using OpenFlowDaniel Philip Venmani, Djamal Zeghlache, Yvon Gourhant. 1-8 [doi]
- Routing in Content-Centric Networks: From Names to ConceptsGeorgios V. Lioudakis, Angelos-Christos Anadiotis, Aziz S. Mousas, Charalampos Z. Patrikakis, Dimitra I. Kaklamani, Iakovos S. Venieris. 1-5 [doi]
- Dynamic Incentives for Risk ManagementTansu Alpcan. 1-5 [doi]
- CSMA-Based Bandwidth Estimation for Cognitive Radio Sensor NetworksGhalib A. Shah, Özgür B. Akan. 1-5 [doi]
- Technical Enforcement of European Privacy Legislation: An Access Control ApproachKheira Bekara, Maryline Laurent, Than Ha Nguyen. 1-7 [doi]
- A Study of Mobility in Ad Hoc Networks and Its Effects on a Hop Count Based Distance EstimationSabrina Merkel, Sanaz Mostaghim, Hartmut Schmeck. 1-5 [doi]
- RECOMAC: A Cross-Layer Cooperative Network Protocol for Wireless Ad Hoc NetworksM. Sarper Gokturk, Özgür Gürbüz, Elza Erkip. 1-7 [doi]
- Risk Management for IT Security: When Theory Meets PracticeAnil Kumar Chorppath, Tansu Alpcan. 1-5 [doi]
- Self-Certified Based Trust Establishment Scheme in Ad-Hoc NetworksKhaled Hamouid, Kamel Adi. 1-7 [doi]
- VoIP over VANETs (VoVAN): A QoS Measurements Analysis of Inter-Vehicular Voice Communication in Urban ScenarioSaid El Brak, Mohammed Bouhorma, Anouar A. Boudhir. 1-6 [doi]
- Resource Location for Opportunistic NetworksAndre Marques Poersch, Daniel F. Macedo, José Marcos S. Nogueira. 1-5 [doi]
- Effective Energy Management in Routing Protocol for Wireless Sensor NetworksZibouda Aliouat, Makhlouf Aliouat. 1-5 [doi]
- Non-Transferable Proxy Re-Encryption SchemeYi Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu. 1-4 [doi]
- Cluster-Directed Acyclic Graph Formation for IEEE 802.15.4 in Multihop TopologiesBogdan Pavkovic, Won-Joo Hwang, Fabrice Theoleyre. 1-6 [doi]
- Compact Implementation of Threefish and Skein on FPGANuray At, Jean-Luc Beuchat, Ismail San. 1-5 [doi]
- Mobile Robot Aided Self-Deploying Wireless Sensor Networks for Radiation Leak DetectionGurkan Tuna, Kayhan Gulez, Tarik Veli Mumcu, Vehbi C. Gungor. 1-5 [doi]
- Evaluation of Power Efficiency for Digital Serial Interfaces of MicrocontrollersKonstantin Mikhaylov, Jouni Tervonen. 1-5 [doi]
- A Distributed Approach for Secure M2M CommunicationsYosra Ben Saied, Alexis Olivereau, Maryline Laurent. 1-7 [doi]
- Towards an Energy-Efficient Algorithm Based Sleep-Scheduling for Wireless Sensor NetworksBahia Zebbane, Manel Chenait, Nadjib Badache. 1-4 [doi]
- A Multipath Layered Cluster Based Routing for Ad Hoc NetworksImen Jemili, Nader Chaabouni, Abdelfettah Belghith, Mohamed Mosbah. 1-5 [doi]
- Finding Secure Compositions of Software Services: Towards a Pattern Based ApproachLuca Pino, George Spanoudakis. 1-5 [doi]
- Towards Security Certification Schemas for the Internet of ServicesVolkmar Lotz, Samuel Paul Kaluvuri, Francesco Di Cerbo, Antonino Sabetta. 1-5 [doi]
- Mist: A Reliable and Delay-Tolerant Publish/Subscribe Solution for Dynamic NetworksMagnus Skjegstad, Frank T. Johnsen, Trude H. Bloebaum, Torleiv Maseng. 1-8 [doi]
- Performance of OFDM with Blind Interference Suppression SchemesM. G. Samantha Sriyananda, Jyrki Joutsensalo, Timo Hämäläinen 0002. 1-6 [doi]
- Aided Navigation Techniques for Indoor and Outdoor Unmanned VehiclesGurkan Tuna, Kayhan Gulez. 1-4 [doi]
- Energy Cost of Mitigating Physical Attacks in Wireless Sensor NetworksDavut Incebacak, Kemal Bicakci, Bülent Tavli. 1-5 [doi]
- Adaptive Probabilistic Flooding for Multipath RoutingChristophe Betoule, Thomas Bonald, Remi Clavier, Dario Rossi, Giuseppe Rossini, Gilles Thouenon. 1-6 [doi]
- Context-Aware, Trust-Based Access Control for the di.me UserwareMarcel Heupel, Lars Fischer, Dogan Kesdogan, Mohamed Bourimi, Simon Scerri, Fabian Hermann, Rafael Giménez. 1-6 [doi]
- Introduction of Multiflow for HSDPAVesa Hytönen, Aleksandr Puchko, Thomas Höhne, Thomas Chapman. 1-5 [doi]
- SUIT: A Cross Layer Image Transport Protocol with Fuzzy Logic Based Congestion Control for Wireless Multimedia Sensor NetworksCagatay Sonmez, Sinan Isik, Mehmet Yunus Donmez, Özlem Durmaz Incel, Cem Ersoy. 1-6 [doi]
- Learning Traffic Light Phase Schedules from Velocity Profiles in the CloudMarkus Kerper, Christian Wewetzer, Andreas Sasse, Martin Mauve. 1-5 [doi]
- Towards Smart Anti-Malwares for Battery-Powered DevicesHajer Al Housani, Hadi Otrok, Rabeb Mizouni, Jean-Marc Robert, Azzam Mourad. 1-4 [doi]
- Model-Driven Testing of Security Protocols with SecureMDDKuzman Katkalov, Nina Moebius, Kurt Stenzel, Marian Borek, Wolfgang Reif. 1-5 [doi]
- An Energy Efficient Multi-Core Modem Architecture for LTE Mobile TerminalsAnas Showk, Shadi Traboulsi, Attila Bilgic. 1-6 [doi]
- Perfect Confidentiality Network: A Solution for Information Theoretically Secure Key AgreementJohannes Braun 0001, Johannes Buchmann. 1-5 [doi]
- A Study of Trojan Propagation in Online Social NetworksMohammad Reza Faghani, Ashraf Matrawy, Chung-Horng Lung. 1-5 [doi]
- Performance Evaluation of CoAP Using RPL and LPL in TinyOSThomas Potsch, Koojana Kuladinithi, Markus Becker, Peter Trenkamp, Carmelita Görg. 1-5 [doi]
- Toward Cognitive Radio Resource Management Based on Multi-Agent Systems for Improvement of Real-Time Application PerformanceAsma Amraoui, Fatima Zohra Benidriss, Badr Benmammar, Francine Krief, Fethi Tarik Bendimerad. 1-4 [doi]
- Automatic Identification Based on Hand Geometry and Probabilistic Neural NetworksEl-Sayed M. El-Alfy. 1-5 [doi]
- Redefining Security EngineeringCarsten Rudolph, Andreas Fuchs. 1-6 [doi]
- HumanS: A Human Mobility Sensing SimulatorTakumi Kanaya, Akihito Hiromori, Hirozumi Yamaguchi, Teruo Higashino. 1-4 [doi]
- Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organised NetworksOkoli Adaobi, Ejiro Igbesoko, Mona Ghassemian. 1-5 [doi]
- Energy Efficient Optimization and Route Recovery for Gradient Broadcast Routing Protocol for Wireless Sensor NetworksAnya Apavatjrut. 1-4 [doi]
- A Semi-Analytical Macroscopic MAC Layer Model for LTE UplinkSpiros Louvros, Athanasios C. Iossifides, Konstantinos Aggelis, A. Baltagiannis, G. Economou. 1-5 [doi]
- Fighting Phishing the Information-Centric WayNikos Fotiou, Giannis F. Marias, George C. Polyzos. 1-5 [doi]
- Solid Waste Management Architecture Using Wireless Sensor Network TechnologySauro Longhi, Davide Marzioni, Emanuele Alidori, Gianluca Di Buo, Mariorosario Prist, Massimo Grisostomi, Matteo Pirro. 1-5 [doi]
- Mobility-Aware Topology Manager for Publish-Subscribe NetworksBorislava Gajic, Jesús Palenzuela, Janne Riihijärvi, Petri Mähönen. 1-5 [doi]
- Improving Trust and Privacy Models in Social NetworksNafaâ Jabeur, Sherali Zeadally, Sergey Maydebura. 1-5 [doi]
- DBAS: A Deployable Bandwidth Aggregation SystemKarim Habak, Moustafa Youssef, Khaled A. Harras. 1-6 [doi]
- A Topology-Based Approach to the Predictive Analysis of Intelligent Transportation Systems DynamicsAli HAMLILI. 1-5 [doi]
- SUCH: A Cloud Computing Management ToolHuiming Anna Yu, Jonathan Rann, Justin Zhan. 1-4 [doi]
- Efficient Cluster-Based Fault-Tolerant Schemes for Wireless Sensor NetworksMohamed Lehsaini, Mohammed Feham, Hervé Guyennet. 1-5 [doi]
- Throughput Limits in Spectrum Sensing Cognitive Radio Networks Using Point ProcessesAnthony Busson, Bijan Jabbari, Alireza Babaei, Véronique Vèque. 1-8 [doi]