


default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Volume 10
Volume 10, Number 1, March 2019
- Joonsang Baek

, Willy Susilo
, Jongkil Kim
:
Guest Editorial: Security and Privacy for Contemporary Network Computing Environment. 1-3 - Zheng Yang, Kimmo Järvinen:

Towards Modeling Privacy in WiFi Fingerprinting Indoor Localization and its Application. 4-22 - Leon J. Helsloot, Gamze Tillem, Zekeriya Erkin:

BAdASS: Preserving Privacy in Behavioural Advertising with Applied Secret Sharing. 23-41 - Carol J. Fung, Bahman Rashidi, Vivian Genaro Motti

:
Multi-View Permission Risk Notification for Smartphone System. 42-57 - Hassan Khader Almathami

, Majed A. Alrafiee, Elena Vlahu-Gjorgievska, Khin Than Win
:
An Analytical Approach to Using and Implementing Beacons: Opportunities and Challenges. 58-74 - Ziba Eslami, Mahnaz Noroozi

, Joonsang Baek
:
On the Security of a Privacy-Preserving Ranked Multi-Keyword Search Scheme. 75-85
Volume 10, Number 2, June 2019
- Viktoriia Korzhuk, Anton Groznykh, Alexander Menshikov, Martin Strecker

:
Identification of Attacks against Wireless Sensor Networks Based on Behaviour Analysis. 1-21 - Davide Fiorino, Mario Collotta

, Renato Ferrero
:
Usability evaluation of touch gestures for Mobile Augmented Reality applications. 22-36 - Mohammad Shahadat Hossain

, Zinnia Sultana
, Lutfun Nahar, Karl Andersson:
An Intelligent System to Diagnose Chikungunya under Uncertainty. 37-54 - Maxim Kolomeets

, Andrey Chechulin
, Igor V. Kotenko:
Social networks analysis by graph algorithms on the example of the VKontakte social network. 55-75
Volume 10, Number 3, September 2019
- Pairat Thorncharoensri

, Willy Susilo
, Joonsang Baek
:
Efficient Controlled Signature for a Large Network with Multi Security-level Setting. 1-20 - Zeynep Mavus, Pelin Angin:

A Secure Model For Efficient Live Migration of Containers. 21-44 - Mario Giliberto, Fabio Arena

, Giovanni Pau:
A fuzzy-based Solution for Optimized Management of Energy Consumption in e-bikes. 45-64 - Shing Ki Wong, Siu-Ming Yiu:

Detection on auto clickers in mobile games. 65-80
Volume 10, Number 4, December 2019
- Chi-Sheng Shih, Wei-Yu Hsieh, Chia-Lung Kao:

Traceability for Vehicular Network Real-Time Messaging Based on Blockchain Technology. 1-21 - Minjae Park, Geunha You, Seong-je Cho, Minkyu Park, Sangchul Han:

A Framework for Identifying Obfuscation Techniques applied to Android Apps using Machine Learning. 22-30 - Jui-Chun Liu, Yi-Quan Ke, Yi-Chih Kao, Shi-Chun Tsai, Yi-Bing Lin:

A Dual-Stack Authentication Mechanism Through SNMP. 31-45 - Aram Kim

, Junhyoung Oh, Jinho Ryu
, Jemin Lee, Kookheui Kwon, Kyungho Lee:
SoK: A Systematic Review of Insider Threat Detection. 46-67 - Yang Wang, Willy Susilo

, Joonsang Baek
, Jongkil Kim
, Intae Kim
:
Generic Construction of Fair Exchange Scheme with Semi-Trusted Adjudicator. 68-87 - Gwangbae Choi, Serge Vaudenay:

Timed-Release Encryption With Master Time Bound Key (Extended). 88-108 - Maxim Kolomeets

, Amira Benachour, Didier El Baz, Andrey Chechulin, Martin Strecker
, Igor V. Kotenko:
Reference architecture for social networks graph analysis. 109-125

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














