default search action
Search dblp for Publications
export results for "toc:db/journals/jowua/jowua1.bht:"
@article{DBLP:journals/jowua/0002CC10, author = {Jie Zhang and Chen Chen and Robin Cohen}, title = {A Scalable and Effective Trust-Based Framework for Vehicular Ad-Hoc Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {3--15}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.003}, doi = {10.22667/JOWUA.2010.12.31.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/0002CC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BernardosGCCS10, author = {Carlos Jesus Bernardos and Marco Gramaglia and Luis M. Contreras and Mar{\'{\i}}a Calder{\'{o}}n and Ignacio Soto}, title = {Network-based Localized {IP} mobility Management: Proxy Mobile IPv6 and Current Trends in Standardization}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {16--35}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.016}, doi = {10.22667/JOWUA.2010.09.31.016}, timestamp = {Thu, 05 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BernardosGCCS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BienPN10, author = {Van Quang Bien and R. Venkatesha Prasad and Ignas G. Niemegeers}, title = {Handoff in Radio over Fiber Indoor Networks at 60 GHz}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {71--82}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.071}, doi = {10.22667/JOWUA.2010.09.31.071}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BienPN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CostaLMMISDM10, author = {Gabriele Costa and Aliaksandr Lazouski and Fabio Martinelli and Ilaria Matteucci and Val{\'{e}}rie Issarny and Rachid Saadi and Nicola Dragoni and Fabio Massacci}, title = {Security-by-Contract-with-Trust for Mobile Devices}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {75--91}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.075}, doi = {10.22667/JOWUA.2010.12.31.075}, timestamp = {Tue, 05 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CostaLMMISDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/FuchsP10, author = {Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {14--28}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.014}, doi = {10.22667/JOWUA.2010.06.31.014}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/FuchsP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Gal-OzGG10, author = {Nurit Gal{-}Oz and Tal Grinshpoun and Ehud Gudes}, title = {Privacy Issues with Sharing and Computing Reputation across Communities}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {16--34}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.016}, doi = {10.22667/JOWUA.2010.12.31.016}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Gal-OzGG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HanKG10, author = {Youn{-}Hee Han and Chan{-}Myung Kim and Joon{-}Min Gil}, title = {A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {96--106}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.096}, doi = {10.22667/JOWUA.2010.09.31.096}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HanKG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/JaraZG10, author = {Antonio J. Jara and Miguel A. Zamora and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {An Initial Approach to Support Mobility in Hospital Wireless Sensor Networks based on 6LoWPAN {(HWSN6)}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {107--122}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.107}, doi = {10.22667/JOWUA.2010.09.31.107}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/JaraZG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KafleI10, author = {Ved P. Kafle and Masugi Inoue}, title = {Locator {ID} Separation for Mobility Management in the New Generation Network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {3--15}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.003}, doi = {10.22667/JOWUA.2010.09.31.003}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KafleI10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KimSNH10, author = {Mucheol Kim and Jiwan Seo and Sanhyun Noh and Sangyong Han}, title = {Reliable Social Trust Management with Mitigating Sparsity Problem}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {86--97}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.086}, doi = {10.22667/JOWUA.2010.06.31.086}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KimSNH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KiriyamaWXT10, author = {Sawako Kiriyama and Ryuji Wakikawa and Jinwei Xia and Fumio Teraoka}, title = {Context Reflector for Proxy Mobile IPv6}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {36--51}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.036}, doi = {10.22667/JOWUA.2010.09.31.036}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KiriyamaWXT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Kofod-PetersenC10, author = {Anders Kofod{-}Petersen and J{\"{o}}rg Cassens}, title = {Proxies for Privacy in Ambient Systems}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {62--74}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.062}, doi = {10.22667/JOWUA.2010.12.31.062}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Kofod-PetersenC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LeeT10, author = {Jong{-}Hyouk Lee and Fumio Teraoka}, title = {Guest Editorial: Advances in Wireless Mobile and Sensor Technologies}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {1--2}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.001}, doi = {10.22667/JOWUA.2010.09.31.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LeeT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LeeYCPYY10, author = {Kyungroul Lee and Hyeungjun Yeuk and Youngtae Choi and Sitha Pho and Ilsun You and Kangbin Yim}, title = {Safe Authentication Protocol for Secure {USB} Memories}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {46--55}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.046}, doi = {10.22667/JOWUA.2010.06.31.046}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LeeYCPYY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LiuCWW10, author = {Debin Liu and L. Jean Camp and XiaoFeng Wang and Lusha Wang}, title = {Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {29--45}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.029}, doi = {10.22667/JOWUA.2010.06.31.029}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LiuCWW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/NagarajanJ10, author = {Anand Nagarajan and Christian Damsgaard Jensen}, title = {A Generic Role Based Access Control Model for Wind Power Systems}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {35--49}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.035}, doi = {10.22667/JOWUA.2010.12.31.035}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/NagarajanJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SalemS10, author = {Malek Ben Salem and Salvatore J. Stolfo}, title = {Detecting Masqueraders: {A} Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {3--13}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.003}, doi = {10.22667/JOWUA.2010.06.31.003}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SalemS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/StanierNBLW10, author = {James Stanier and Stephen Naicken and Anirban Basu and Jian Li and Ian Wakeman}, title = {Can We Use Trust in Online Dating?}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {50--61}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.050}, doi = {10.22667/JOWUA.2010.12.31.050}, timestamp = {Wed, 14 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/StanierNBLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Sun0SYS10, author = {Jingbo Sun and Yue Wang and Hongbo Si and Jian Yuan and Xiuming Shan}, title = {Aggregate Human Mobility Modeling Using Principal Component Analysis}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {83--95}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.083}, doi = {10.22667/JOWUA.2010.09.31.083}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Sun0SYS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ThiD10, author = {Que Nguyet Tran Thi and Tran Khanh Dang}, title = {Towards Side-Effects-free Database Penetration Testing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {72--85}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.072}, doi = {10.22667/JOWUA.2010.06.31.072}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ThiD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/TongCM10, author = {Val{\'{e}}rie Viet Triem Tong and Andrew J. Clark and Ludovic M{\'{e}}}, title = {Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {56--71}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.056}, doi = {10.22667/JOWUA.2010.06.31.056}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/TongCM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YanZY10, author = {Zhiwei Yan and Huachun Zhou and Ilsun You}, title = {{N-NEMO:} {A} Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {2/3}, pages = {52--70}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.09.31.052}, doi = {10.22667/JOWUA.2010.09.31.052}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YanZY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/Yim10, author = {Kangbin Yim}, title = {Guest Editorial: Advances in Trust Management}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {4}, pages = {1--2}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.12.31.001}, doi = {10.22667/JOWUA.2010.12.31.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/Yim10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/You10, author = {Ilsun You}, title = {Editorial}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {1}, number = {1}, pages = {1--2}, year = {2010}, url = {https://doi.org/10.22667/JOWUA.2010.06.31.001}, doi = {10.22667/JOWUA.2010.06.31.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/You10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.