Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             35 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive security design with malicious node detection in cluster-based sensor networks Hsieh, Meng-Yen
2007
140-141 11-12 p. 2385-2400
16 p.
artikel
2 A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks Jiang, Yixin
2007
140-141 11-12 p. 2428-2441
14 p.
artikel
3 Advances in performance evaluation of computer and telecommunications networking Obaidat, Mohammad S.
2002
140-141 11-12 p. 993-996
4 p.
artikel
4 Analysis of the effect of security on data and voice traffic in WLAN Boulmalf, Mohammed
2007
140-141 11-12 p. 2468-2477
10 p.
artikel
5 Analytical modeling of primary and secondary load as induced by video applications using UDP/IP Wolfinger, B.E.
2002
140-141 11-12 p. 1094-1102
9 p.
artikel
6 An applied research study for the provision of a QoS-oriented environment for voice and video services over satellite networks Adami, Davide
2002
140-141 11-12 p. 1113-1124
12 p.
artikel
7 An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks Ngai, Edith C.H.
2007
140-141 11-12 p. 2353-2364
12 p.
artikel
8 A new injection limitation mechanism for wormhole networks Obaidat, M.S
2002
140-141 11-12 p. 997-1008
12 p.
artikel
9 An implementation for ATM Adaptation Layer 5 Obaidat, M.S
2002
140-141 11-12 p. 1103-1112
10 p.
artikel
10 A survey of key management schemes in wireless sensor networks Xiao, Yang
2007
140-141 11-12 p. 2314-2341
28 p.
artikel
11 Automated design of hierarchical intranets Habib, Sami J.
2002
140-141 11-12 p. 1066-1075
10 p.
artikel
12 Bandwidth allocation in a multiservice satellite network based on long-term weather forecast scenarios Bolla, Raffaele
2002
140-141 11-12 p. 1037-1046
10 p.
artikel
13 Decoupling different time scales of network QoS systems Schmitt, Jens
2002
140-141 11-12 p. 1047-1057
11 p.
artikel
14 Efficient group key management for multi-privileged groups Wang, Guojun
2007
140-141 11-12 p. 2497-2509
13 p.
artikel
15 Fault-resilient sensing in wireless sensor networks Nakayama, Hidehisa
2007
140-141 11-12 p. 2375-2384
10 p.
artikel
16 Geo-encryption protocol for mobile networks Al-Fuqaha, Ala
2007
140-141 11-12 p. 2510-2517
8 p.
artikel
17 IFC Editorial Board 2007
140-141 11-12 p. IFC-
1 p.
artikel
18 Investigating the performance of TCP in mobile ad hoc networks Perkins, Dmitri D.
2002
140-141 11-12 p. 1132-1139
8 p.
artikel
19 Minimizing re-routing in MPLS networks with preemption-aware constraint-based routing Szviatovszki, Balázs
2002
140-141 11-12 p. 1076-1084
9 p.
artikel
20 OBC - Contents 2007
140-141 11-12 p. OBC-
1 p.
artikel
21 Optimal branching factor for tree-based reliable multicast protocols Maihöfer, Christian
2002
140-141 11-12 p. 1018-1027
10 p.
artikel
22 Optimization network flow control and price coordination with feedback: proposal of a new distributed algorithm Malinowski, Krzysztof
2002
140-141 11-12 p. 1028-1036
9 p.
artikel
23 Pair-wise path key establishment in wireless sensor networks Sheu, Jang-Ping
2007
140-141 11-12 p. 2365-2374
10 p.
artikel
24 Performance analysis of multicast algorithms for mobile satellite communication networks 1 The views expressed in this article are those of the authors and do not reflect the official policy of the United States Air Force, Department of Defense or the U.S. Government. 1 Thomas, Ryan W
2002
140-141 11-12 p. 1085-1093
9 p.
artikel
25 Performance evaluation and comparison of different ad hoc routing protocols Trung, Ha Duyen
2007
140-141 11-12 p. 2478-2496
19 p.
artikel
26 Providing distributed certificate authority service in cluster-based mobile ad hoc networks Dong, Y.
2007
140-141 11-12 p. 2442-2452
11 p.
artikel
27 QoS-driven multicast tree generation using Tabu search Youssef, Habib
2002
140-141 11-12 p. 1140-1149
10 p.
artikel
28 QUIPS-II: a simulation tool for the design and performance evaluation of Diffserv-based networks Di, Zesong
2002
140-141 11-12 p. 1125-1131
7 p.
artikel
29 SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks Nasser, Nidal
2007
140-141 11-12 p. 2401-2412
12 p.
artikel
30 Special issue on Security on Wireless Ad Hoc and Sensor Networks Guizani, Sghaier
2007
140-141 11-12 p. 2311-2313
3 p.
artikel
31 Token bucket characterization of long-range dependent traffic Procissi, Gregorio
2002
140-141 11-12 p. 1009-1017
9 p.
artikel
32 Toward secure and scalable time synchronization in ad hoc networks Chen, Lin
2007
140-141 11-12 p. 2453-2467
15 p.
artikel
33 TRAP: a high performance protocol for wireless local area networks Nicopolitidis, P.
2002
140-141 11-12 p. 1058-1065
8 p.
artikel
34 Trust-based security for wireless ad hoc and sensor networks Boukerch, A.
2007
140-141 11-12 p. 2413-2427
15 p.
artikel
35 Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks Ssu, Kuo-Feng
2007
140-141 11-12 p. 2342-2352
11 p.
artikel
                             35 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland