Search dblp for Publications

export results for "toc:db/journals/jowua/jowua4.bht:"

 download as .bib file

@article{DBLP:journals/jowua/AbbasiCD13,
  author       = {Sedigheh Abbasi and
                  Stelvio Cimato and
                  Ernesto Damiani},
  title        = {Clustering Models in Secure Clustered Multiparty Computation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {63--76},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.063},
  doi          = {10.22667/JOWUA.2013.06.31.063},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AbbasiCD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/AnginB13,
  author       = {Pelin Angin and
                  Bharat K. Bhargava},
  title        = {An Agent-based Optimization Framework for Mobile-Cloud Computing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {1--17},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.001},
  doi          = {10.22667/JOWUA.2013.06.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/AnginB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BabaE13,
  author       = {Kensuke Baba and
                  Serina Egawa},
  title        = {On the Order of Search for Personal Identification with Biometric
                  Images},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {97--103},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.097},
  doi          = {10.22667/JOWUA.2013.06.31.097},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BabaE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BadiiCPPSTV13,
  author       = {Atta Badii and
                  Davide Carboni and
                  Antonio Pintus and
                  Andrea Piras and
                  Alberto Serra and
                  Marco Tiemann and
                  Nagarajan Viswanathan},
  title        = {CityScripts: Unifying Web, IoT and Smart City Services in a Smart
                  Citizen Workspace},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {3},
  pages        = {58--78},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.09.31.058},
  doi          = {10.22667/JOWUA.2013.09.31.058},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BadiiCPPSTV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BkakriaCCFG13,
  author       = {Anis Bkakria and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Jos{\'{e}} M. Fernandez and
                  David Gross{-}Amblard},
  title        = {Preserving Multi-relational Outsourced Databases Confidentiality using
                  Fragmentation and Encryption},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {39--62},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.039},
  doi          = {10.22667/JOWUA.2013.06.31.039},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BkakriaCCFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CadeB13,
  author       = {David Cad{\'{e}} and
                  Bruno Blanchet},
  title        = {From Computationally-Proved Protocol Specifications to Implementations
                  and Application to {SSH}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {4--31},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.004},
  doi          = {10.22667/JOWUA.2013.03.31.004},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CadeB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChangLCHL13,
  author       = {Chia{-}Hsuan Chang and
                  Chia{-}Lung Liu and
                  Hsi{-}Lu Chao and
                  Kuei{-}Li Huang and
                  Yi{-}Bing Lin},
  title        = {A Novel {LIPA} Scheme for {LTE} VoIP Services with Home eNBs},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {3},
  pages        = {1--22},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.09.31.001},
  doi          = {10.22667/JOWUA.2013.09.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChangLCHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChenLMP13,
  author       = {Xihui Chen and
                  Gabriele Lenzini and
                  Sjouke Mauw and
                  Jun Pang},
  title        = {Design and Formal Analysis of {A} Group Signature Based Electronic
                  Toll Pricing System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {55--75},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.055},
  doi          = {10.22667/JOWUA.2013.03.31.055},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChenLMP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ChoPSR13,
  author       = {Wonjun Cho and
                  Youngho Park and
                  Chul Sur and
                  Kyung Hyune Rhee},
  title        = {An Improved Privacy-Preserving Navigation Protocol in \{VANET\}s},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {80--92},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.080},
  doi          = {10.22667/JOWUA.2013.12.31.080},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ChoPSR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ClaycombH13,
  author       = {William R. Claycomb and
                  Carly L. Huth},
  title        = {A Method For Characterizing Sociotechnical Events Related to Insider
                  Threat Sabotage},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {1--19},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.001},
  doi          = {10.22667/JOWUA.2013.12.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ClaycombH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CrassDJKM13,
  author       = {Stefan Cra{\ss} and
                  Tobias D{\"{o}}nz and
                  Gerson Joskowicz and
                  Eva K{\"{u}}hn and
                  Alexander Marek},
  title        = {Securing a Space-Based Service Architecture with Coordination-Driven
                  Access Control},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {76--97},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.076},
  doi          = {10.22667/JOWUA.2013.03.31.076},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jowua/CrassDJKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/EbriBSV13,
  author       = {Noura Al Ebri and
                  Joonsang Baek and
                  Abdulhadi Shoufan and
                  Quang Hieu Vu},
  title        = {Forward-Secure Identity-Based Signature: New Generic Constructions
                  and Their Applications},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {32--54},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.032},
  doi          = {10.22667/JOWUA.2013.03.31.032},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/EbriBSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/GochhayatV13,
  author       = {Sarada Prasad Gochhayat and
                  Pallapa Venkataram},
  title        = {Performance Analysis of a Priority based Resource Allocation Scheme
                  in Ubiquitous Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {3},
  pages        = {23--40},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.09.31.023},
  doi          = {10.22667/JOWUA.2013.09.31.023},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/GochhayatV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HouSUY13,
  author       = {Shuhui Hou and
                  Ry{\^{o}}ichi Sasaki and
                  Tetsutaro Uehara and
                  Siu{-}Ming Yiu},
  title        = {Double Encryption for Data Authenticity and Integrity in Privacy-
                  preserving Confidential Forensic Investigation},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {104--113},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.104},
  doi          = {10.22667/JOWUA.2013.06.31.104},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HouSUY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HuaiQLLL13,
  author       = {Weicheng Huai and
                  Zhuzhong Qian and
                  Xin Li and
                  Gangyi Luo and
                  Sanglu Lu},
  title        = {Energy Aware Task Scheduling in Data Centers},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {18--38},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.018},
  doi          = {10.22667/JOWUA.2013.06.31.018},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HuaiQLLL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/JaraLG13,
  author       = {Antonio J. Jara and
                  Latif Ladid and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title        = {The Internet of Everything through IPv6: An Analysis of Challenges,
                  Solutions and Opportunities},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {3},
  pages        = {97--118},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.09.31.097},
  doi          = {10.22667/JOWUA.2013.09.31.097},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/JaraLG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LeggMNHAGC13,
  author       = {Philip A. Legg and
                  Nick Moffat and
                  Jason R. C. Nurse and
                  Jassim Happa and
                  Ioannis Agrafiotis and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {Towards a Conceptual Model and Reasoning Structure for Insider Threat
                  Detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {20--37},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.020},
  doi          = {10.22667/JOWUA.2013.12.31.020},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LeggMNHAGC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LomoteyD13,
  author       = {Richard K. Lomotey and
                  Ralph Deters},
  title        = {Facilitating Multi-Device Usage in mHealth},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {2},
  pages        = {77--96},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.06.31.077},
  doi          = {10.22667/JOWUA.2013.06.31.077},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LomoteyD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/MatsunoY13,
  author       = {Yutaka Matsuno and
                  Shuichiro Yamamoto},
  title        = {A Framework for Dependability Consensus Building and In-Operation
                  Assurance},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {118--134},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.118},
  doi          = {10.22667/JOWUA.2013.03.31.118},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/MatsunoY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/PoiselMT13,
  author       = {Rainer Poisel and
                  Erich Malzer and
                  Simon Tjoa},
  title        = {Evidence and Cloud Computing: The Virtual Machine Introspection Approach},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {135--152},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.135},
  doi          = {10.22667/JOWUA.2013.03.31.135},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/PoiselMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ProbstH13,
  author       = {Christian W. Probst and
                  Ren{\'{e}} Rydhof Hansen},
  title        = {Reachability-based Impact as a Measure for Insiderness},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {38--48},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.038},
  doi          = {10.22667/JOWUA.2013.12.31.038},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ProbstH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SeoCKH13,
  author       = {Jiwan Seo and
                  Seungjin Choi and
                  Mucheol Kim and
                  Sangyong Han},
  title        = {The Method of Personalized Recommendation with Ensemble Combination},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {108--121},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.108},
  doi          = {10.22667/JOWUA.2013.12.31.108},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SeoCKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ShahzadL13,
  author       = {Raja Khurram Shahzad and
                  Niklas Lavesson},
  title        = {Comparative Analysis of Voting Schemes for Ensemble-based Malware
                  Detection},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {98--117},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.098},
  doi          = {10.22667/JOWUA.2013.03.31.098},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ShahzadL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ShinY13,
  author       = {Dongwan Shin and
                  Huiping Yao},
  title        = {A User Study of Security Warnings for Detecting {QR} Code Based Attacks
                  on Android Phone},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {49--64},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.049},
  doi          = {10.22667/JOWUA.2013.12.31.049},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ShinY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SinghRB13,
  author       = {Kunwar Singh and
                  C. Pandu Rangan and
                  A. K. Banerjee},
  title        = {Lattice Based Efficient Threshold Public Key Encryption Scheme},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {93--107},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.093},
  doi          = {10.22667/JOWUA.2013.12.31.093},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SinghRB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/TakayaTY13,
  author       = {Mayumi Takaya and
                  Yusuke Tsuruta and
                  Akihiro Yamamura},
  title        = {Reverse Turing Test using Touchscreens and {CAPTCHA}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {3},
  pages        = {41--57},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.09.31.041},
  doi          = {10.22667/JOWUA.2013.09.31.041},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/TakayaTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ViragKE13,
  author       = {L{\'{a}}szl{\'{o}} Vir{\'{a}}g and
                  J{\'{o}}zsef Kov{\'{a}}cs and
                  Andr{\'{a}}s Edelmayer},
  title        = {Interacting Advanced {ITS} Communications with Low-Power Sensor Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {3},
  pages        = {79--96},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.09.31.079},
  doi          = {10.22667/JOWUA.2013.09.31.079},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ViragKE13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/WeipplTT13,
  author       = {Edgar R. Weippl and
                  A Min Tjoa and
                  Simon Tjoa},
  title        = {Frontiers in Security and Dependability},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {1},
  pages        = {1--3},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.03.31.001},
  doi          = {10.22667/JOWUA.2013.03.31.001},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/WeipplTT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/XuLMZ13,
  author       = {Jian Xu and
                  Yuxi Li and
                  Jingwei Miao and
                  Fucai Zhou},
  title        = {The Electronic Cash Protocol Based on Dynamic Group Signature},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {4},
  number       = {4},
  pages        = {65--79},
  year         = {2013},
  url          = {https://doi.org/10.22667/JOWUA.2013.12.31.065},
  doi          = {10.22667/JOWUA.2013.12.31.065},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/XuLMZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics