Energy-efficient and secure mobile node reauthentication scheme for mobile wireless sensor networks | 0 | 0.34 | 2019 |
Improved yoking proof protocols for preserving anonymity. | 0 | 0.34 | 2018 |
A Simple and Efficient Replay Attack Prevention Scheme for LoRaWAN. | 0 | 0.34 | 2017 |
An Efficient Location Verification Scheme for Static Wireless Sensor Networks. | 1 | 0.36 | 2017 |
Adaptive Data Placement for Improving Performance of Online Social Network Services in a Multicloud Environment | 1 | 0.35 | 2017 |
A Dual Key-Based Activation Scheme for Secure LoRaWAN. | 9 | 1.33 | 2017 |
POSTER: A Password-based Authentication by Splitting Roles of User Interface | 0 | 0.34 | 2015 |
A traffic flow theory based density adopted emergency message dissemination scheme for vehicular ad hoc networks | 0 | 0.34 | 2015 |
Trend of centralization in Bitcoin's distributed network | 6 | 0.59 | 2015 |
POSTER: Page Table Manipulation Attack | 3 | 0.36 | 2015 |
Cluster based emergency message dissemination scheme for vehicular ad hoc networks | 2 | 0.37 | 2014 |
A cluster-based countermeasure against blackhole attacks in MANETs | 4 | 0.43 | 2014 |
An efficient offline grouping proof protocol using multiple types of tags | 0 | 0.34 | 2014 |
A survey of traffic-based routing metrics in family of expected transmission count for self-organizing networks | 3 | 0.40 | 2014 |
Centralized Payment System Using Social Networks Account | 1 | 0.36 | 2014 |
A public key based PMIPv6 authentication scheme | 1 | 0.39 | 2014 |
A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks | 3 | 0.43 | 2014 |
A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks | 2 | 0.38 | 2013 |
A countermeasure against wormhole attacks in MANETs using analytical hierarchy process methodology | 2 | 0.37 | 2013 |
A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks | 6 | 0.44 | 2013 |
Time-Efficient Handover Using Enhanced Route Optimization in Global PMIPv6 | 0 | 0.34 | 2013 |
Hot hole-induced device degradation by drain junction reverse current. | 0 | 0.34 | 2013 |
A Novel Pre-Authentication Scheme Based on Fast Channel Switching in IEEE 802.11 WLANs. | 13 | 0.37 | 2012 |
A Cluster-based Countermeasure against Media Access Control Layer Attacks in IEEE 802.11 Ad Hoc Networks. | 0 | 0.34 | 2012 |
Handling Malicious Flooding Attacks Through Enhancement Of Packet Processing Technique In Mobile Ad Hoc Networks | 4 | 0.42 | 2011 |
Time-Based Detection and Location of Wormhole Attacks in Wireless Ad Hoc Networks | 3 | 0.40 | 2011 |
Energy-Efficiency Media Independent Handover Mechanism | 0 | 0.34 | 2011 |
Group Connectivity Model for Industrial Wireless Sensor Networks | 26 | 1.07 | 2010 |
TCP Aware Link Layer Agent for Seamless Vertical Handoff in the Cellular/WLAN Integrated Network | 3 | 0.38 | 2010 |
Location-based pairwise key predistribution for wireless sensor networks | 9 | 0.51 | 2009 |
A cluster key management scheme utilizing time-based keys for wireless sensor networks | 0 | 0.34 | 2009 |
TSA: time series adaptation for enhanced cell reselection in UMTS | 0 | 0.34 | 2009 |
A New Soft Handover Mechanism using DCHs in 3GPP HSDPA Networks | 2 | 0.38 | 2009 |
On the Privacy-Preserving HCI Issues | 1 | 0.35 | 2009 |
An energy-efficient interface selection for multi-mode terminals by utilizing out-of-band paging channels | 14 | 0.80 | 2009 |
A New Soft Handover Mechanism Using DCHs in High-Speed Downlink Packet Access Networks | 0 | 0.34 | 2009 |
Energy-Efficient Vertical Handover Mechanism | 3 | 0.48 | 2009 |
Achievable throughput-based MAC layer handoff in IEEE 802.11 wireless local area networks | 0 | 0.34 | 2009 |
ABC²: A New Approach to Seamless Mobility Using Cellular Networks and WLANs | 0 | 0.34 | 2008 |
An Improvement of Park-Chung-Cho's Stream Authentication Scheme by Using Information Dispersal Algorithm | 0 | 0.34 | 2007 |
Secure Dynamic Network Reprogramming Using Supplementary Hash in Wireless Sensor Networks | 4 | 0.42 | 2007 |
An Efficient Scalable And Hybrid Arithmetic Unit For Public Key Cryptographic Applications | 0 | 0.34 | 2007 |
A time-based key management protocol for wireless sensor networks | 13 | 1.10 | 2007 |
A secure communication scheme for mobile wireless sensor networks using hamming distance | 0 | 0.34 | 2007 |
Design and implementation of wireless PKI technology suitable for mobile phone in mobile-commerce | 17 | 1.92 | 2007 |
A new authentication and key agreement protocol scheme in convergence of UMTS and DVB-H networks | 1 | 0.37 | 2007 |
A Novel Vertical Handoff Scheme Based On Mobility Speed In Integrated Wlan And Umts Networks | 0 | 0.34 | 2007 |
Location-Aware Signaling Protocol for WWAN and WLAN Interworking | 1 | 0.41 | 2007 |
Mixed Key Management Using Hamming Distance for Mobile Ad-Hoc Networks | 0 | 0.34 | 2007 |
A dynamic load-aware congestion control scheme in optical burst switching networks | 2 | 0.44 | 2007 |