default search action
Journal of Network and Computer Applications, Volume 62
Volume 62, February 2016
- Prosanta Gope, Tzonelih Hwang:
An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. 1-8 - Soo-Yeon Ji, Bong-Keun Jeong, Seonho Choi, Dong Hyun Jeong:
A multi-level intrusion detection method for abnormal network behaviors. 9-17 - Usman Shaukat, Ejaz Ahmed, Zahid Anwar, Feng Xia:
Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges. 18-40 - Athul Prasad, Andreas Mäder, Konstantinos Samdanis, Andreas Kunz, Genadi Velev:
Enabling group communication for public safety in LTE-Advanced networks. 41-52 - Zakira Inayat, Abdullah Gani, Nor Badrul Anuar, Muhammad Khurram Khan, Shahid Anwar:
Intrusion response systems: Foundations, design, and challenges. 53-74 - Heena Rathore, Venkataramana Badarla, George Kodimattam Joseph:
Sociopsychological trust model for Wireless Sensor Networks. 75-87 - Feng Tian, Kuo-Ming Chao, Zuren Feng, Keyi Xing, Nazaraf Shah:
Using a wireless visual sensor network to harmonically navigate multiple low-cost wheelchairs in an indoor environment. 88-99 - Peiyan Yuan, Ping Liu, Shaojie Tang:
RIM: Relative-importance based data forwarding in people-centric networks. 100-111 - Hui Xia, Jia Yu, Chengliang Tian, Zhenkuan Pan, Edwin Hsing-Mean Sha:
Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks. 112-127 - Chengwen Luo, Hande Hong, Long Cheng, Mun Choon Chan, Jianqiang Li, Zhong Ming:
Accuracy-aware wireless indoor localization: Feasibility and applications. 128-136 - Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
A survey on data leakage prevention systems. 137-152 - Mawloud Omar, Hamida Boufaghes, Lydia Mammeri, Amel Taalba, Abdelkamel Tari:
Secure and reliable certificate chains recovery protocol for mobile ad hoc networks. 153-162 - Peiyan Yuan, Lilin Fan, Ping Liu, Shaojie Tang:
Recent progress in routing protocols of mobile opportunistic networks: A clear taxonomy, analysis and evaluation. 163-170 - Seyed Yahya Vaezpour, Rui Zhang, Kui Wu, Jianping Wang, Gholamali C. Shoja:
A new approach to mitigating security risks of phone clone co-location over mobile clouds. 171-184
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.