


default search action
Ad Hoc Networks, Volume 20
Volume 20, September 2014
- Ding Wang
, Ping Wang:
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. 1-15 - Trang Cao Minh, Boris Bellalta, Miquel Oliver
:
Design of a generic management system for wireless sensor networks. 16-35 - José María Cabero, Ignacio (Iñaki) Olabarrieta
, Sergio Gil-Lopez
, Javier Del Ser, José Luis Martín
:
A novel range-free localization algorithm to turn connectivity traces and motion data into localization information. 36-52 - Lei Lei, Dan Wang, Liang Zhou, Xiaoming Chen, Shengsuo Cai:
Link availability estimation based reliable routing for aeronautical ad hoc networks. 53-63 - Gulnur Selda Uyanik, Mohammad Abdel-Rahman
, Marwan Krunz:
Optimal channel assignment with aggregation in multi-channel systems: A resilient approach to adjacent-channel interference. 64-76 - Lanny Sitanayah
, Cormac J. Sreenan, Kenneth N. Brown:
A hybrid MAC protocol for emergency response wireless sensor networks. 77-95 - Muhamed Turkanovic
, Bostjan Brumen, Marko Hölbl
:
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion. 96-112 - Baris Fidan, Fatma Kiraz:
On convexification of range measurement based sensor and source localization problems. 113-118 - Donghai Zhu, Xinyu Yang, Wei Yu
, Xinwen Fu:
Network coding versus traditional routing in adversarial wireless networks. 119-131 - Faezeh Hajiaghajani, Yogesh Piolet Thulasidharan, Mahmoud Taghizadeh, Subir Biswas:
Economy driven content dissemination in Delay Tolerant Networks. 132-149 - Yisong Jiang, Weiren Shi, Xiaogang Wang, Hongbing Li:
A distributed routing for wireless sensor networks with mobile sink based on the greedy embedding. 150-162 - Ramon Novales, Neeraj Mittal, Kamil Saraç:
SKAIT: A parameterized key assignment scheme for confidential communication in resource constrained ad hoc wireless networks. 163-181 - Sara Pino-Povedano, Francisco Javier González-Serrano
:
Comparison of optimization algorithms in the sensor selection for predictive target tracking. 182-192

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.