default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Volume 2
Volume 2, Number 1, March 2011
- Christian W. Probst, Ilsun You, Dongwan Shin, Kouichi Sakurai:
Addressing Insider Threats and Information Leakage. 1-3 - Jeffrey Hunker, Christian W. Probst:
Insiders and Insider Threats - An Overview of Definitions and Mitigation Techniques. 4-27 - Andrew P. Moore, Dawn M. Cappelli, Thomas C. Caron, Eric D. Shaw, Derrick Spooner, Randall F. Trzeciak:
A Preliminary Model of Insider Theft of Intellectual Property. 28-49 - Shinsaku Kiyomoto, Keith M. Martin:
Model for a Common Notion of Privacy Leakage on Public Database. 50-62 - Carol J. Fung:
Collaborative Intrusion Detection Networks and Insider Attacks. 63-74 - Wolter Pieters:
Representing Humans in System Security Models: An Actor-Network Approach. 75-92 - Philip Nobles, Shahid Ali, Howard Chivers:
Improved Estimation of Trilateration Distances for Indoor Wireless Intrusion Detection. 93-102 - Giovanni Di Crescenzo, Abhrajit Ghosh, Abhinay Kampasi, Rajesh Talpade, Yin Zhang:
Detecting Anomalies in Active Insider Stepping Stone Attacks. 103-120
Volume 2, Number 2, June 2011
- Tomoya Enokido, Ailixier Aikebaier, Makoto Takizawa:
Computation and Transmission Rate Based Algorithm for Reducing the Total Power Consumption. 1-18 - Peyman TalebiFard, Victor C. M. Leung:
Context-Aware Mobility Management in Heterogeneous Network Environments. 19-32 - Hsiao-Han Chen, Yi-Bing Lin, Yingrong Coral Sung, Ren-Huang Liou:
Direction-based Wireless Remote Controller: A Smartphone Application. 33-45 - Abu Zafar M. Shahriar, Mohammed Atiquzzaman, William D. Ivancic:
Evaluation of the Route Optimization for NEMO in Satellite Networks. 46-66 - Luis M. Contreras, Carlos Jesus Bernardos, Ignacio Soto:
RAMS: A Protocol Extension to PMIPv6 for Improving Handover Performance of Multicast Traffic. 67-82 - Yoshiaki Shiraishi, Masami Mohri, Youji Fukuta:
A Server-Aided Computation Protocol Revisited for Confidentiality of Cloud Service. 83-94
Volume 2, Number 3, September 2011
- Fang-Yie Leu:
Emerging Security Technologies and Applications. 1-3 - Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi:
Efficient and Low-Cost RFID Authentication Schemes. 4-25 - Ilsun You, Yoshiaki Hori, Kouichi Sakurai:
Enhancing SVO Logic for Mobile IPv6 Security Protocols. 26-52 - Tanveer A. Zia, Albert Y. Zomaya:
A Lightweight Security Framework for Wireless Sensor Networks. 53-73 - Nasrollah Pakniat, Ziba Eslami:
A Proxy E-Raffle Protocol Based on Proxy Signatures. 74-84 - Fuw-Yi Yang, Zhen-Wei Liu, Su-Hui Chiu:
Mobile Banking Payment System. 85-95 - Yi-Li Huang, Fang-Yie Leu:
Constructing a Secure Point-to-Point Wireless Environment by Integrating Diffie-Hellman PKDS RSA and Stream Ciphering for Users Known to Each Other. 96-107
Volume 2, Number 4, December 2011
- Edgar R. Weippl, A Min Tjoa, Günther Pernul:
Guest Editorial: Advances in Applied Security. 1-3 - Maria Leitner, Juergen Mangler, Stefanie Rinderle-Ma:
SPRINT- Responsibilities: Design and Development of Security Policies in Process-aware Information Systems. 4-26 - Stefan Rass, Raphael Wigoutschnigg, Peter Schartner:
Doubly-Anonymous Crowds: Using Secret-Sharing to achieve Sender- and Receiver-Anonymity. 27-41 - Rainer Poisel, Simon Tjoa, Paul Tavolato:
Advanced File Carving Approaches for Multimedia Files. 42-58 - Aniello Castiglione, Bonaventura D'Alessio, Alfredo De Santis, Francesco Palmieri:
Hiding Information into OOXML Documents: New Steganographic Perspectives. 59-83 - Cornelius Moucha, Enrico Lovat, Alexander Pretschner:
A virtualized usage control bus system. 84-101
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.