default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 24 matches
- 2010
- Jie Zhang, Chen Chen, Robin Cohen:
A Scalable and Effective Trust-Based Framework for Vehicular Ad-Hoc Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 3-15 (2010) - Carlos Jesus Bernardos, Marco Gramaglia, Luis M. Contreras, María Calderón, Ignacio Soto:
Network-based Localized IP mobility Management: Proxy Mobile IPv6 and Current Trends in Standardization. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(2/3): 16-35 (2010) - Van Quang Bien, R. Venkatesha Prasad, Ignas G. Niemegeers:
Handoff in Radio over Fiber Indoor Networks at 60 GHz. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(2/3): 71-82 (2010) - Gabriele Costa, Aliaksandr Lazouski, Fabio Martinelli, Ilaria Matteucci, Valérie Issarny, Rachid Saadi, Nicola Dragoni, Fabio Massacci:
Security-by-Contract-with-Trust for Mobile Devices. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 75-91 (2010) - Ludwig Fuchs, Günther Pernul:
Reducing the Risk of Insider Misuse by Revising Identity Management and User Account Data. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 14-28 (2010) - Nurit Gal-Oz, Tal Grinshpoun, Ehud Gudes:
Privacy Issues with Sharing and Computing Reputation across Communities. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 16-34 (2010) - Youn-Hee Han, Chan-Myung Kim, Joon-Min Gil:
A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor Networks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(2/3): 96-106 (2010) - Antonio J. Jara, Miguel A. Zamora, Antonio Fernandez Gómez-Skarmeta:
An Initial Approach to Support Mobility in Hospital Wireless Sensor Networks based on 6LoWPAN (HWSN6). J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(2/3): 107-122 (2010) - Ved P. Kafle, Masugi Inoue:
Locator ID Separation for Mobility Management in the New Generation Network. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(2/3): 3-15 (2010) - Mucheol Kim, Jiwan Seo, Sanhyun Noh, Sangyong Han:
Reliable Social Trust Management with Mitigating Sparsity Problem. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 86-97 (2010) - Sawako Kiriyama, Ryuji Wakikawa, Jinwei Xia, Fumio Teraoka:
Context Reflector for Proxy Mobile IPv6. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(2/3): 36-51 (2010) - Anders Kofod-Petersen, Jörg Cassens:
Proxies for Privacy in Ambient Systems. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 62-74 (2010) - Jong-Hyouk Lee, Fumio Teraoka:
Guest Editorial: Advances in Wireless Mobile and Sensor Technologies. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(2/3): 1-2 (2010) - Kyungroul Lee, Hyeungjun Yeuk, Youngtae Choi, Sitha Pho, Ilsun You, Kangbin Yim:
Safe Authentication Protocol for Secure USB Memories. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 46-55 (2010) - Debin Liu, L. Jean Camp, XiaoFeng Wang, Lusha Wang:
Using Budget-Based Access Control to Manage Operational Risks Caused by Insiders. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 29-45 (2010) - Anand Nagarajan, Christian Damsgaard Jensen:
A Generic Role Based Access Control Model for Wind Power Systems. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 35-49 (2010) - Malek Ben Salem, Salvatore J. Stolfo:
Detecting Masqueraders: A Comparison of One-Class Bag-of-Words User Behavior Modeling Techniques. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 3-13 (2010) - James Stanier, Stephen Naicken, Anirban Basu, Jian Li, Ian Wakeman:
Can We Use Trust in Online Dating? J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 50-61 (2010) - Jingbo Sun, Yue Wang, Hongbo Si, Jian Yuan, Xiuming Shan:
Aggregate Human Mobility Modeling Using Principal Component Analysis. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(2/3): 83-95 (2010) - Que Nguyet Tran Thi, Tran Khanh Dang:
Towards Side-Effects-free Database Penetration Testing. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 72-85 (2010) - Valérie Viet Triem Tong, Andrew J. Clark, Ludovic Mé:
Specifying and Enforcing a Fine-Grained Information Flow Policy: Model and Experiments. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 56-71 (2010) - Zhiwei Yan, Huachun Zhou, Ilsun You:
N-NEMO: A Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(2/3): 52-70 (2010) - Kangbin Yim:
Guest Editorial: Advances in Trust Management. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(4): 1-2 (2010) - Ilsun You:
Editorial. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1(1): 1-2 (2010)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-25 04:54 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint