default search action
International Journal of Ad Hoc and Ubiquitous Computing, Volume 18
Volume 18, Numbers 1/2, 2015
- Dieynaba Mall, Karim Konaté, Al-Sakib Khan Pathan:
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue. 3-22 - Chun-Rong Su, Jiann-Jone Chen:
Reconfigurable content-based image retrieval on peer-to-peer networks. 23-36 - Fahad T. Bin Muhaya:
Security analysis and improvement of a mutual authentication scheme under trusted computing. 37-44 - Suntae Kim:
A quantitative and knowledge-based approach to choosing security architectural tactics. 45-53 - Rong-Jian Chen, Shi-Jinn Horng, Po-Hsian Huang:
Anti-forensic steganography using multi-bit MER with flexible bit location. 54-66 - Debiao He, Muhammad Khurram Khan, Neeraj Kumar:
A new handover authentication protocol based on bilinear pairing functions for wireless networks. 67-74 - Dheerendra Mishra, Ankita Chaturvedi, Sourav Mukhopadhyay:
An improved biometric-based remote user authentication scheme for connected healthcare. 75-84 - Murad A. Rassam, Anazida Zainal, Mohd Aizaini Maarof:
Principal component analysis-based data reduction model for wireless sensor networks. 85-101 - Antonio Sapuppo, João Figueiras:
Designing for privacy in ubiquitous social networking. 102-119
Volume 18, Number 3, 2015
- Antonio Sapuppo, Boon-Chong Seet:
Privacy and technology challenges for ubiquitous social networking. 121-138 - Ben-Jye Chang, Ying-Hsin Liang, Tsung-Yuan Yang:
Cross-layer-based reliable robust transmission for emergency messages in high mobility unreliable VANET networks. 139-152 - Chia-Hsu Kuo, Tzung-Shi Chen, Ying-Hung Lo:
Efficient traffic load reduction algorithms for mitigating query hotspots for wireless sensor networks. 153-163 - Mahshad Parsa, Seyed Ahmad Motamedi, Hadi Safdarkhani, Mohsen Maadani:
Performance evaluation of beacon enabled IEEE 802.15.4 network with downlink and uplink traffic and limited retransmission. 164-180 - Long Zhang, Liusheng Huang, Hongli Xu:
Selectable sensing period optimisation for energy-constrained cognitive radio networks. 181-189
Volume 18, Number 4, 2015
- Jorge Alvarez-Lozano, J. Antonio García-Macías, Edgar Chávez:
Crowd location forecasting at points of interest. 191-204 - Ben-Jye Chang, Ying-Hsin Liang, Jiun-Ting Lai:
Performance analyses of minimising emergency message collisions and maximising network throughput in IEEE 802.11p VANET network. 205-221 - Li-Hsing Yen, Kuo-Wei Huang:
Link-preserving interference-minimisation channel assignment in multi-radio wireless mesh networks. 222-233 - Saiyu Qi, Li Lu, Zhenjiang Li, Mo Li:
BEST: a bidirectional efficiency-privacy transferable authentication protocol for RFID-enabled supply chain. 234-244 - Chu Du, ZhangBing Zhou, Shi Ying, Jianwei Niu, Qun Wang:
An efficient indexing and query mechanism for ubiquitous IoT services. 245-255
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.