Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jowua/jowua4.bht:"
@article{DBLP:journals/jowua/AbbasiCD13, author = {Sedigheh Abbasi and Stelvio Cimato and Ernesto Damiani}, title = {Clustering Models in Secure Clustered Multiparty Computation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {63--76}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.063}, doi = {10.22667/JOWUA.2013.06.31.063}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AbbasiCD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/AnginB13, author = {Pelin Angin and Bharat K. Bhargava}, title = {An Agent-based Optimization Framework for Mobile-Cloud Computing}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {1--17}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.001}, doi = {10.22667/JOWUA.2013.06.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/AnginB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BabaE13, author = {Kensuke Baba and Serina Egawa}, title = {On the Order of Search for Personal Identification with Biometric Images}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {97--103}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.097}, doi = {10.22667/JOWUA.2013.06.31.097}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BabaE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BadiiCPPSTV13, author = {Atta Badii and Davide Carboni and Antonio Pintus and Andrea Piras and Alberto Serra and Marco Tiemann and Nagarajan Viswanathan}, title = {CityScripts: Unifying Web, IoT and Smart City Services in a Smart Citizen Workspace}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {3}, pages = {58--78}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.09.31.058}, doi = {10.22667/JOWUA.2013.09.31.058}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BadiiCPPSTV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/BkakriaCCFG13, author = {Anis Bkakria and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Jos{\'{e}} M. Fernandez and David Gross{-}Amblard}, title = {Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {39--62}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.039}, doi = {10.22667/JOWUA.2013.06.31.039}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/BkakriaCCFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CadeB13, author = {David Cad{\'{e}} and Bruno Blanchet}, title = {From Computationally-Proved Protocol Specifications to Implementations and Application to {SSH}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {4--31}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.004}, doi = {10.22667/JOWUA.2013.03.31.004}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/CadeB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChangLCHL13, author = {Chia{-}Hsuan Chang and Chia{-}Lung Liu and Hsi{-}Lu Chao and Kuei{-}Li Huang and Yi{-}Bing Lin}, title = {A Novel {LIPA} Scheme for {LTE} VoIP Services with Home eNBs}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {3}, pages = {1--22}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.09.31.001}, doi = {10.22667/JOWUA.2013.09.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChangLCHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChenLMP13, author = {Xihui Chen and Gabriele Lenzini and Sjouke Mauw and Jun Pang}, title = {Design and Formal Analysis of {A} Group Signature Based Electronic Toll Pricing System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {55--75}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.055}, doi = {10.22667/JOWUA.2013.03.31.055}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChenLMP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ChoPSR13, author = {Wonjun Cho and Youngho Park and Chul Sur and Kyung Hyune Rhee}, title = {An Improved Privacy-Preserving Navigation Protocol in \{VANET\}s}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {80--92}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.080}, doi = {10.22667/JOWUA.2013.12.31.080}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ChoPSR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ClaycombH13, author = {William R. Claycomb and Carly L. Huth}, title = {A Method For Characterizing Sociotechnical Events Related to Insider Threat Sabotage}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {1--19}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.001}, doi = {10.22667/JOWUA.2013.12.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ClaycombH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CrassDJKM13, author = {Stefan Cra{\ss} and Tobias D{\"{o}}nz and Gerson Joskowicz and Eva K{\"{u}}hn and Alexander Marek}, title = {Securing a Space-Based Service Architecture with Coordination-Driven Access Control}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {76--97}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.076}, doi = {10.22667/JOWUA.2013.03.31.076}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/CrassDJKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/EbriBSV13, author = {Noura Al Ebri and Joonsang Baek and Abdulhadi Shoufan and Quang Hieu Vu}, title = {Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {32--54}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.032}, doi = {10.22667/JOWUA.2013.03.31.032}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/EbriBSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/GochhayatV13, author = {Sarada Prasad Gochhayat and Pallapa Venkataram}, title = {Performance Analysis of a Priority based Resource Allocation Scheme in Ubiquitous Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {3}, pages = {23--40}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.09.31.023}, doi = {10.22667/JOWUA.2013.09.31.023}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/GochhayatV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HouSUY13, author = {Shuhui Hou and Ry{\^{o}}ichi Sasaki and Tetsutaro Uehara and Siu{-}Ming Yiu}, title = {Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {104--113}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.104}, doi = {10.22667/JOWUA.2013.06.31.104}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HouSUY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/HuaiQLLL13, author = {Weicheng Huai and Zhuzhong Qian and Xin Li and Gangyi Luo and Sanglu Lu}, title = {Energy Aware Task Scheduling in Data Centers}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {18--38}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.018}, doi = {10.22667/JOWUA.2013.06.31.018}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/HuaiQLLL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/JaraLG13, author = {Antonio J. Jara and Latif Ladid and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {3}, pages = {97--118}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.09.31.097}, doi = {10.22667/JOWUA.2013.09.31.097}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/JaraLG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LeggMNHAGC13, author = {Philip A. Legg and Nick Moffat and Jason R. C. Nurse and Jassim Happa and Ioannis Agrafiotis and Michael Goldsmith and Sadie Creese}, title = {Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {20--37}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.020}, doi = {10.22667/JOWUA.2013.12.31.020}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LeggMNHAGC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LomoteyD13, author = {Richard K. Lomotey and Ralph Deters}, title = {Facilitating Multi-Device Usage in mHealth}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {2}, pages = {77--96}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.06.31.077}, doi = {10.22667/JOWUA.2013.06.31.077}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LomoteyD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/MatsunoY13, author = {Yutaka Matsuno and Shuichiro Yamamoto}, title = {A Framework for Dependability Consensus Building and In-Operation Assurance}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {118--134}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.118}, doi = {10.22667/JOWUA.2013.03.31.118}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/MatsunoY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/PoiselMT13, author = {Rainer Poisel and Erich Malzer and Simon Tjoa}, title = {Evidence and Cloud Computing: The Virtual Machine Introspection Approach}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {135--152}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.135}, doi = {10.22667/JOWUA.2013.03.31.135}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/PoiselMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ProbstH13, author = {Christian W. Probst and Ren{\'{e}} Rydhof Hansen}, title = {Reachability-based Impact as a Measure for Insiderness}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {38--48}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.038}, doi = {10.22667/JOWUA.2013.12.31.038}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ProbstH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SeoCKH13, author = {Jiwan Seo and Seungjin Choi and Mucheol Kim and Sangyong Han}, title = {The Method of Personalized Recommendation with Ensemble Combination}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {108--121}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.108}, doi = {10.22667/JOWUA.2013.12.31.108}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SeoCKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ShahzadL13, author = {Raja Khurram Shahzad and Niklas Lavesson}, title = {Comparative Analysis of Voting Schemes for Ensemble-based Malware Detection}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {98--117}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.098}, doi = {10.22667/JOWUA.2013.03.31.098}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ShahzadL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ShinY13, author = {Dongwan Shin and Huiping Yao}, title = {A User Study of Security Warnings for Detecting {QR} Code Based Attacks on Android Phone}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {49--64}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.049}, doi = {10.22667/JOWUA.2013.12.31.049}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ShinY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/SinghRB13, author = {Kunwar Singh and C. Pandu Rangan and A. K. Banerjee}, title = {Lattice Based Efficient Threshold Public Key Encryption Scheme}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {93--107}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.093}, doi = {10.22667/JOWUA.2013.12.31.093}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/SinghRB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/TakayaTY13, author = {Mayumi Takaya and Yusuke Tsuruta and Akihiro Yamamura}, title = {Reverse Turing Test using Touchscreens and {CAPTCHA}}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {3}, pages = {41--57}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.09.31.041}, doi = {10.22667/JOWUA.2013.09.31.041}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/TakayaTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/ViragKE13, author = {L{\'{a}}szl{\'{o}} Vir{\'{a}}g and J{\'{o}}zsef Kov{\'{a}}cs and Andr{\'{a}}s Edelmayer}, title = {Interacting Advanced {ITS} Communications with Low-Power Sensor Networks}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {3}, pages = {79--96}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.09.31.079}, doi = {10.22667/JOWUA.2013.09.31.079}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/ViragKE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/WeipplTT13, author = {Edgar R. Weippl and A Min Tjoa and Simon Tjoa}, title = {Frontiers in Security and Dependability}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {1}, pages = {1--3}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.03.31.001}, doi = {10.22667/JOWUA.2013.03.31.001}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/WeipplTT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/XuLMZ13, author = {Jian Xu and Yuxi Li and Jingwei Miao and Fucai Zhou}, title = {The Electronic Cash Protocol Based on Dynamic Group Signature}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {4}, number = {4}, pages = {65--79}, year = {2013}, url = {https://doi.org/10.22667/JOWUA.2013.12.31.065}, doi = {10.22667/JOWUA.2013.12.31.065}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/XuLMZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.