default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Volume 10
Volume 10, Number 1, March 2019
- Joonsang Baek, Willy Susilo, Jongkil Kim:
Guest Editorial: Security and Privacy for Contemporary Network Computing Environment. 1-3 - Zheng Yang, Kimmo Järvinen:
Towards Modeling Privacy in WiFi Fingerprinting Indoor Localization and its Application. 4-22 - Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin:
BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing. 23-41 - Carol J. Fung, Bahman Rashidi, Vivian Genaro Motti:
Multi-View Permission Risk Notification for Smartphone System. 42-57 - Hassan Khader Almathami, Majed A. Alrafiee, Elena Vlahu-Gjorgievska, Khin Than Win:
An Analytical Approach to Using and Implementing Beacons: Opportunities and Challenges. 58-74 - Ziba Eslami, Mahnaz Noroozi, Joonsang Baek:
On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme. 75-85
Volume 10, Number 2, June 2019
- Viktoriia Korzhuk, Anton Groznykh, Alexander Menshikov, Martin Strecker:
Identification of Attacks against Wireless Sensor Networks Based on Behaviour Analysis. 1-21 - Davide Fiorino, Mario Collotta, Renato Ferrero:
Usability evaluation of touch gestures for Mobile Augmented Reality applications. 22-36 - Mohammad Shahadat Hossain, Zinnia Sultana, Lutfun Nahar, Karl Andersson:
An Intelligent System to Diagnose Chikungunya under Uncertainty. 37-54 - Maxim Kolomeets, Andrey Chechulin, Igor V. Kotenko:
Social networks analysis by graph algorithms on the example of the VKontakte social network. 55-75
Volume 10, Number 3, September 2019
- Pairat Thorncharoensri, Willy Susilo, Joonsang Baek:
Efficient Controlled Signature for a Large Network with Multi Security-level Setting. 1-20 - Zeynep Mavus, Pelin Angin:
A Secure Model For Efficient Live Migration of Containers. 21-44 - Mario Giliberto, Fabio Arena, Giovanni Pau:
A fuzzy-based Solution for Optimized Management of Energy Consumption in e-bikes. 45-64 - Shing Ki Wong, Siu-Ming Yiu:
Detection on auto clickers in mobile games. 65-80
Volume 10, Number 4, December 2019
- Chi-Sheng Shih, Wei-Yu Hsieh, Chia-Lung Kao:
Traceability for Vehicular Network Real-Time Messaging Based on Blockchain Technology. 1-21 - Minjae Park, Geunha You, Seong-je Cho, Minkyu Park, Sangchul Han:
A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning. 22-30 - Jui-Chun Liu, Yi-Quan Ke, Yi-Chih Kao, Shi-Chun Tsai, Yi-Bing Lin:
A Dual-Stack Authentication Mechanism Through SNMP. 31-45 - Aram Kim, Junhyoung Oh, Jinho Ryu, Jemin Lee, Kookheui Kwon, Kyungho Lee:
SoK: A Systematic Review of Insider Threat Detection. 46-67 - Yang Wang, Willy Susilo, Joonsang Baek, Jongkil Kim, Intae Kim:
Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator. 68-87 - Gwangbae Choi, Serge Vaudenay:
Timed-Release Encryption With Master Time Bound Key (Extended). 88-108 - Maxim Kolomeets, Amira Benachour, Didier El Baz, Andrey Chechulin, Martin Strecker, Igor V. Kotenko:
Reference architecture for social networks graph analysis. 109-125
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.