default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Volume 1
Volume 1, Number 1, June 2010
- Ilsun You:
Editorial. 1-2 - Malek Ben Salem, Salvatore J. Stolfo:
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques. 3-13 - Ludwig Fuchs, Günther Pernul:
Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data. 14-28 - Debin Liu, L. Jean Camp, XiaoFeng Wang, Lusha Wang:
Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders. 29-45 - Kyungroul Lee, Hyeungjun Yeuk, Youngtae Choi, Sitha Pho, Ilsun You, Kangbin Yim:
Safe Authentication Protocol for Secure USB Memories. 46-55 - Valérie Viet Triem Tong, Andrew J. Clark, Ludovic Mé:
Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments. 56-71 - Que Nguyet Tran Thi, Tran Khanh Dang:
Towards Side-Effects-free Database Penetration Testing. 72-85 - Mucheol Kim, Jiwan Seo, Sanhyun Noh, Sangyong Han:
Reliable Social Trust Management with Mitigating Sparsity Problem. 86-97
Volume 1, Numbers 2/3, September 2010
- Jong-Hyouk Lee, Fumio Teraoka:
Guest Editorial: Advances in Wireless Mobile and Sensor Technologies. 1-2 - Ved P. Kafle, Masugi Inoue:
Locator ID Separation for Mobility Management in the New Generation Network. 3-15 - Carlos Jesus Bernardos, Marco Gramaglia, Luis M. Contreras, María Calderón, Ignacio Soto:
Network-based Localized IP mobility Management: Proxy Mobile IPv6 and Current Trends in Standardization. 16-35 - Sawako Kiriyama, Ryuji Wakikawa, Jinwei Xia, Fumio Teraoka:
Context Reflector for Proxy Mobile IPv6. 36-51 - Zhiwei Yan, Huachun Zhou, Ilsun You:
N-NEMO: A Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network. 52-70 - Van Quang Bien, R. Venkatesha Prasad, Ignas G. Niemegeers:
Handoff in Radio over Fiber Indoor Networks at 60 GHz. 71-82 - Jingbo Sun, Yue Wang, Hongbo Si, Jian Yuan, Xiuming Shan:
Aggregate Human Mobility Modeling Using Principal Component Analysis. 83-95 - Youn-Hee Han, Chan-Myung Kim, Joon-Min Gil:
A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks. 96-106 - Antonio J. Jara, Miguel A. Zamora, Antonio Fernandez Gómez-Skarmeta:
An Initial Approach to Support Mobility in Hospital Wireless Sensor Networks based on 6LoWPAN (HWSN6). 107-122
Volume 1, Number 4, December 2010
- Kangbin Yim:
Guest Editorial: Advances in Trust Management. 1-2 - Jie Zhang, Chen Chen, Robin Cohen:
A Scalable and Effective Trust-Based Framework for Vehicular Ad-Hoc Networks. 3-15 - Nurit Gal-Oz, Tal Grinshpoun, Ehud Gudes:
Privacy Issues with Sharing and Computing Reputation across Communities. 16-34 - Anand Nagarajan, Christian Damsgaard Jensen:
A Generic Role Based Access Control Model for Wind Power Systems. 35-49 - James Stanier, Stephen Naicken, Anirban Basu, Jian Li, Ian Wakeman:
Can We Use Trust in Online Dating? 50-61 - Anders Kofod-Petersen, Jörg Cassens:
Proxies for Privacy in Ambient Systems. 62-74 - Gabriele Costa, Aliaksandr Lazouski, Fabio Martinelli, Ilaria Matteucci, Valérie Issarny, Rachid Saadi, Nicola Dragoni, Fabio Massacci:
Security-by-Contract-with-Trust for Mobile Devices. 75-91
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.