


default search action
6th Q2SWinet 2010: Bodrum, Turkey
- Mario Gerla, Matteo Cesana, Jalel Ben-Othman:
Q2SWinet'10, Proceedings of the Sixth ACM Symposium on QoS and Security for Wireless and Mobile Networks, Bodrum, Turkey, October 20-21, 2010. ACM 2010, ISBN 978-1-4503-0275-3
Quality of service in wireless broadband networks
- Yuichi Harada, Mayumi Komatsu, Tamaki Nakamura, Shigeo Shioda
, Shiro Sakata, Tutomu Murase:
Cross-layer approach for supporting QoS in IEEE802.11 DCF wireless LANs. 1-10 - Duygu Karaoglan, Albert Levi
, Erkay Savas:
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography. 11-18 - Mourad Alia, Marc Lacoste, Ruan He, Frank Eliassen:
Putting together QoS and security in autonomic pervasive systems. 19-28 - Bafing Sambou, Fabrice Peyrard, Christian Fraboul:
Optimized HCCA schedulers for an IEEE 802.11e/AFDX hybrid network. 29-32
Security architectures for wireless sensor networks
- Azzedine Boukerche, Yonglin Ren, Lynda Mokdad:
Applying symmetric and asymmetric key algorithms for the security in wireless networks: proof of correctness. 33-40 - Robert Abo, Kamel Barkaoui, Hafedh Zayani
:
A probabilistic analysis of energy efficiency of wireless sensor network duty-cycled MAC protocols: application to S-MAC and Eco-MAC. 41-48 - Mohsen Karimzadeh Kiskani, Babak Hossein Khalaj, Shahin Vakilinia:
Delay QoS provisioning in cognitive radio systems using adaptive modulation. 49-54
Quality of service in wireless sensor networks
- Cédric Ramassamy, Hacène Fouchal
, Philippe Hunel, Nicolas Vidot:
A pragmatic testing approach for wireless sensor networks. 55-61 - M. Aykut Yigitel, Özlem Durmaz Incel, Cem Ersoy
:
Diff-MAC: a QoS-aware MAC protocol with differentiated services and hybrid prioritization for wireless multimedia sensor networks. 62-69 - Alexandros Zaharis, Adamantini Martini, Leonidas Perlepes
, Georgios I. Stamoulis, Panayotis Kikiras:
Live forensics framework for wireless sensor nodes using sandboxing. 70-77 - Christian Probst, Armin Veichtlbauer:
Security features of a generic sensor data acquisition system. 78-81
Security, trust and reputation in wireless ad hoc and mesh networks
- Vincenzo Gaglio, Alessandra De Paola
, Marco Ortolani, Giuseppe Lo Re:
A TRNG exploiting multi-source physical data. 82-89 - Wassim Itani, Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab:
Slow but certain wins the race: authenticated bundle communication in delay tolerant networks. 90-97 - Gyözö Gódor, Péter Szendi, Sándor Imre
:
Elliptic curve cryptography based authentication protocol for small computational capacity RFID systems. 98-105 - Christos A. Papageorgiou, Konstantinos Birkos, Tasos Dagiuklas, Stavros A. Kotsopoulos:
Extending P2PSIP VoIP communication for ad hoc networks. 106-109

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.