


default search action
Journal of Network and Computer Applications, Volume 62
Volume 62, February 2016
- Prosanta Gope, Tzonelih Hwang:

An efficient mutual authentication and key agreement scheme preserving strong anonymity of the mobile user in global mobility networks. 1-8 - Soo-Yeon Ji

, Bong-Keun Jeong, Seonho Choi, Dong Hyun Jeong
:
A multi-level intrusion detection method for abnormal network behaviors. 9-17 - Usman Shaukat, Ejaz Ahmed, Zahid Anwar, Feng Xia

:
Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges. 18-40 - Athul Prasad

, Andreas Mäder, Konstantinos Samdanis
, Andreas Kunz, Genadi Velev:
Enabling group communication for public safety in LTE-Advanced networks. 41-52 - Zakira Inayat, Abdullah Gani

, Nor Badrul Anuar
, Muhammad Khurram Khan
, Shahid Anwar
:
Intrusion response systems: Foundations, design, and challenges. 53-74 - Heena Rathore

, Venkataramana Badarla, George Kodimattam Joseph:
Sociopsychological trust model for Wireless Sensor Networks. 75-87 - Feng Tian

, Kuo-Ming Chao
, Zuren Feng, Keyi Xing, Nazaraf Shah
:
Using a wireless visual sensor network to harmonically navigate multiple low-cost wheelchairs in an indoor environment. 88-99 - Peiyan Yuan

, Ping Liu, Shaojie Tang:
RIM: Relative-importance based data forwarding in people-centric networks. 100-111 - Hui Xia, Jia Yu, Chengliang Tian, Zhenkuan Pan, Edwin Hsing-Mean Sha:

Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks. 112-127 - Chengwen Luo, Hande Hong, Long Cheng, Mun Choon Chan, Jianqiang Li

, Zhong Ming:
Accuracy-aware wireless indoor localization: Feasibility and applications. 128-136 - Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:

A survey on data leakage prevention systems. 137-152 - Mawloud Omar, Hamida Boufaghes, Lydia Mammeri, Amel Taalba, Abdelkamel Tari:

Secure and reliable certificate chains recovery protocol for mobile ad hoc networks. 153-162 - Peiyan Yuan

, Lilin Fan, Ping Liu, Shaojie Tang:
Recent progress in routing protocols of mobile opportunistic networks: A clear taxonomy, analysis and evaluation. 163-170 - Seyed Yahya Vaezpour, Rui Zhang, Kui Wu, Jianping Wang

, Gholamali C. Shoja:
A new approach to mitigating security risks of phone clone co-location over mobile clouds. 171-184

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














