Stop the war!
Остановите войну!
for scientists:
default search action
International Journal of Communication Networks and Information Security, Volume 2
Volume 2, Number 1, 2010
- S. Pradheepkumar, V. Vijayalakshmi, G. Zayaraz:
Implementation of Pseudo-Random Route-Driven ECDH Scheme for Heterogeneous Sensor Networks. - Miguel Garcia, Jaime Lloret, Sandra Sendra, Raquel Lacuesta Gilaberte:
Secure Communications in Group-based Wireless Sensor Networks. - Al-Sakib Khan Pathan:
A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication Schemes Using Smart Cards. - Sathish Chandran:
Enhanced Wideband Adaptive Arrays with Different Length Quadrature Mirror Filter Banks. - G. Indumathi, K. Murugesan:
An Adaptive Time slot Allocation for Statistical QoS guarantees in Wireless Networks using Cross-layer approach. - T. V. Padmavathy, M. Chitra:
Performance Evaluation of Energy Efficient Modulation Scheme and Hop Distance Estimation for WSN. - Lin Cheng, Rahul Shakya:
Worm Spreading and Patching in Inter-vehicle Communications. - Adnen Rajhi, Said Ghnimi, Ali Garssallah:
Electrical Characteristics of a Dual-Band Microstrip Patch Antenna for GSM/ UMTS / WLAN Operations. - Shoaib Khan, Kok-Keong Loo, Adnan K. Kiani:
Tested Evaluation of Fast and Secure Handover in FMIPv6.
- Xianhui Che:
Overview of Optical Local Access Networks Development and Design Challenges.
Volume 2, Number 2, 2010
- Shun-Fang Yang, Jung-Shyr Wu:
Guard Channel based Call Admission Control Schemes in Hierarchical Mobile IPv6 Networks. - Ayyaswamy Kathirvel:
Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS. - Erik Chromý, Matej Kavacký:
Asynchronous Networks and Erlang Formulas. - Nitul Dutta:
QoS provisioning in three layer MIPv6 Architecture using RSVP. - Gang Xu, Yiwen Zhu, Meng Han:
Broadband cognitive radio transmission based on sub-channel sensing and NC-OFDM. - André Cardote, Susana Sargento:
Mesh Networks Planning: Optimization with Multi-Hop Interference. - Jaydip Sen:
An Agent-Based Intrusion Detection System for Local Area Networks. - Moussa Ayyash, Donald R. Ucci, Khaled M. Alzoubi:
A Proactively Maintained Quality of Service Infrastructure for Wireless Mobile Ad Hoc Networks. - S. M. Kamruzzaman:
An Energy Efficient Multichannel MAC Protocol for Cognitive Radio Ad Hoc Networks.
Volume 2, Number 3, 2010
- Wernhuar Tarng, Nai-Wei Chen, Li-Zhong Deng, Kuo-Liang Ou, Kun-Rong Hsie, Mingteh Chen:
The Integration of Heterogeneous Wireless Networks (IEEE 802.11/IEEE 802.16) and its QoS Analysis. - J. Vidhya, Perumal Dananjayan:
Energy Efficient STBC -Encoded Cooperative MIMO Routing Scheme for Cluster Based wireless sensor networks. - Natarajan Meghanathan:
Grid Block Energy Based Data Gathering Algorithms for Wireless Sensor Networks. - Georges Abou-Khalil, Samuel Pierre:
Client-Based Network-Assisted Mobile IPv6. - Khadija Rasul, Nujhat Nuerie, Al-Sakib Khan Pathan:
Securing Wireless Sensor Networks with An Efficient B+ Tree-Based Key Management Scheme. - Mznah Al-Rodhaan, Lewis M. Mackenzie, Mohamed Ould-Khaoua:
Efficient Expanding Ring Search for MANETs. - Md. Jahedul Islam, Md. Rafiqul Islam:
Impact of Chip Shape on the Performance of DS-OCDMA in Presence of GVD and SPM. - Rodrigo Rubira Branco, Celso Massaki Hirata:
Streamed analysis of network files to avoid false positives and to detect client-side attacks. - Jun Lu, Te-Shun Chou, Jean H. Andrian:
Semi-Blind Channel Estimation and Multi-User Data Detection for Downlink MC-CDMA. - Sarhan M. Musa, Nader F. Mir:
Handoff Management for Mobile Agents in High Speed Wireless Networks. - Kamaludin Mohamad Yusof, John Woods, Steve Fitz:
LFSSR: Localised Frequency Scanning Short Range Estimation for Wireless Sensor Networks. - Joshua B. Wade, Hiroshi Fujinoki, Adam Coffman, Delia M. Feerer, Andrew G. Hauck:
A Cross-Layer Approach for Mitigating Denial of Service Attacks: Device-Driver Packet Filter and Remote Firewalling. - Y. A. Khan, Mohammad Abdul Matin, S. I. Ferdous:
PAPR Reduction in MIMO-OFDM Systems using Modified PTS and SLM without Side Information. - Ferchichi Abdelhak, Najib Fadlallah, Gharssallah Ali:
A Sierpenski slot antenna as a TAG RFID antenna.
- Abdul Wahid, Dongkyun Kim:
Analyzing Routing Protocols for Underwater Wireless Sensor Networks.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.