nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cross-layer framework for multiobjective performance evaluation of wireless ad hoc networks
|
Jaffrès-Runser, Katia |
|
2013 |
11 |
8 |
p. 2147-2171 25 p. |
artikel |
2 |
Admission control on multipath routing in 802.11-based wireless mesh networks
|
Zhao, Peng |
|
2013 |
11 |
8 |
p. 2235-2251 17 p. |
artikel |
3 |
A dual-mode energy efficient encryption protocol for wireless sensor networks
|
Moh’d, Abidalrahman |
|
2013 |
11 |
8 |
p. 2588-2604 17 p. |
artikel |
4 |
AGREE: exploiting energy harvesting to support data-centric access control in WSNs
|
Bianchi, Giuseppe |
|
2013 |
11 |
8 |
p. 2625-2636 12 p. |
artikel |
5 |
An exploration of aggregation convergecast scheduling
|
de Souza, Evandro |
|
2013 |
11 |
8 |
p. 2391-2407 17 p. |
artikel |
6 |
A novel batch-based group key management protocol applied to the Internet of Things
|
Veltri, Luca |
|
2013 |
11 |
8 |
p. 2724-2737 14 p. |
artikel |
7 |
Automated design algorithms for tactical wireless networks
|
Younis, Ossama |
|
2013 |
11 |
8 |
p. 2461-2469 9 p. |
artikel |
8 |
Cooperative schemes for path establishment in mobile ad-hoc networks under shadow-fading
|
Dimitriou, Nikos |
|
2013 |
11 |
8 |
p. 2556-2566 11 p. |
artikel |
9 |
Detection of malicious users in cognitive radio ad hoc networks: A non-parametric statistical approach
|
Adelantado, Ferran |
|
2013 |
11 |
8 |
p. 2367-2380 14 p. |
artikel |
10 |
DistressNet: A disaster response system providing constant availability cloud-like services
|
Chenji, Harsha |
|
2013 |
11 |
8 |
p. 2440-2460 21 p. |
artikel |
11 |
DTLS based security and two-way authentication for the Internet of Things
|
Kothmayr, Thomas |
|
2013 |
11 |
8 |
p. 2710-2723 14 p. |
artikel |
12 |
Energy and spectrum-aware MAC protocol for perpetual wireless nanosensor networks in the Terahertz Band
|
Wang, Pu |
|
2013 |
11 |
8 |
p. 2541-2555 15 p. |
artikel |
13 |
Energy constraint clustering algorithms for wireless sensor networks
|
Albath, Julia |
|
2013 |
11 |
8 |
p. 2512-2525 14 p. |
artikel |
14 |
Fast distributed multi-hop relative time synchronization protocol and estimators for wireless sensor networks
|
Djenouri, Djamel |
|
2013 |
11 |
8 |
p. 2329-2344 16 p. |
artikel |
15 |
Heuristic optimization techniques for self-orientation of directional antennas in long-distance point-to-point broadband networks
|
Min, Byung-Cheol |
|
2013 |
11 |
8 |
p. 2252-2263 12 p. |
artikel |
16 |
Impact of node distance on selfish replica allocation in a mobile ad-hoc network
|
Ryu, Byung-Gul |
|
2013 |
11 |
8 |
p. 2187-2202 16 p. |
artikel |
17 |
Impacts of user-selfishness on cooperative content caching in social wireless networks
|
Taghizadeh, Mahmoud |
|
2013 |
11 |
8 |
p. 2423-2439 17 p. |
artikel |
18 |
Improving scalability in vehicular communication using one-way hash chain method
|
Sulaiman, Ashraph |
|
2013 |
11 |
8 |
p. 2526-2540 15 p. |
artikel |
19 |
Improving the transport performance in delay tolerant networks by random linear network coding and global acknowledgments
|
Ali, Arshad |
|
2013 |
11 |
8 |
p. 2567-2587 21 p. |
artikel |
20 |
Improving vehicular safety message delivery through the implementation of a cognitive vehicular network
|
Ghandour, Ali J. |
|
2013 |
11 |
8 |
p. 2408-2422 15 p. |
artikel |
21 |
Inside Front Cover - Editorial Board
|
|
|
2013 |
11 |
8 |
p. IFC- 1 p. |
artikel |
22 |
It measures like me: An IoTs algorithm in WSNs based on heuristics behavior and clustering methods
|
Di Stefano, Alessandro |
|
2013 |
11 |
8 |
p. 2637-2647 11 p. |
artikel |
23 |
Joint route selection and resource allocation in multihop wireless networks based on a game theoretic approach
|
Ortín, Jorge |
|
2013 |
11 |
8 |
p. 2203-2216 14 p. |
artikel |
24 |
Lightweight routing with dynamic interests in wireless sensor and actor networks
|
Akbaş, Mustafa İlhan |
|
2013 |
11 |
8 |
p. 2313-2328 16 p. |
artikel |
25 |
Load balancing techniques for lifetime maximizing in wireless sensor networks
|
Kacimi, Rahim |
|
2013 |
11 |
8 |
p. 2172-2186 15 p. |
artikel |
26 |
Multiple point of interest discovery and coverage with mobile wireless sensors
|
Erdelj, Milan |
|
2013 |
11 |
8 |
p. 2288-2300 13 p. |
artikel |
27 |
One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks
|
Wang, Qiuhua |
|
2013 |
11 |
8 |
p. 2500-2511 12 p. |
artikel |
28 |
On the tradeoff between altruism and selfishness in MANET trust management
|
Cho, Jin-Hee |
|
2013 |
11 |
8 |
p. 2217-2234 18 p. |
artikel |
29 |
Onto scalable wireless ad hoc networks: Adaptive and location-aware clustering
|
Conceição, Luís |
|
2013 |
11 |
8 |
p. 2484-2499 16 p. |
artikel |
30 |
Optimum node placement in wireless opportunistic routing networks
|
Cerdà-Alabern, Llorenç |
|
2013 |
11 |
8 |
p. 2273-2287 15 p. |
artikel |
31 |
Passive wake-up radios: From devices to applications
|
Ba, He |
|
2013 |
11 |
8 |
p. 2605-2621 17 p. |
artikel |
32 |
Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations
|
González-Tablas, A.I. |
|
2013 |
11 |
8 |
p. 2693-2709 17 p. |
artikel |
33 |
Reliable data approximation in wireless sensor network
|
Kamal, Abu Raihan M. |
|
2013 |
11 |
8 |
p. 2470-2483 14 p. |
artikel |
34 |
RFID-based localization with Non-Blocking tag scanning
|
Kashkouli Nejad, Keyvan |
|
2013 |
11 |
8 |
p. 2264-2272 9 p. |
artikel |
35 |
Security, privacy and trust management in the internet of things era – SePriT
|
Sicari, Sabrina |
|
2013 |
11 |
8 |
p. 2623-2624 2 p. |
artikel |
36 |
Sensing clouds: A distributed cooperative target tracking with tiny binary noisy sensors
|
Marian, Tal |
|
2013 |
11 |
8 |
p. 2356-2366 11 p. |
artikel |
37 |
Spoofing detection in IEEE 802.15.4 networks based on received signal strength
|
Jokar, Paria |
|
2013 |
11 |
8 |
p. 2648-2660 13 p. |
artikel |
38 |
SVELTE: Real-time intrusion detection in the Internet of Things
|
Raza, Shahid |
|
2013 |
11 |
8 |
p. 2661-2674 14 p. |
artikel |
39 |
TC-BAC: A trust and centrality degree based access control model in wireless sensor networks
|
Duan, Junqi |
|
2013 |
11 |
8 |
p. 2675-2692 18 p. |
artikel |
40 |
Towards efficient dynamic surface gateway deployment for underwater network
|
Ibrahim, Saleh |
|
2013 |
11 |
8 |
p. 2301-2312 12 p. |
artikel |
41 |
VANET-based secure taxi service
|
Chim, T.W. |
|
2013 |
11 |
8 |
p. 2381-2390 10 p. |
artikel |
42 |
Void traversal for efficient non-planar geometric routing
|
Clouser, Thomas |
|
2013 |
11 |
8 |
p. 2345-2355 11 p. |
artikel |