nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive security design with malicious node detection in cluster-based sensor networks
|
Hsieh, Meng-Yen |
|
2007 |
|
11-12 |
p. 2385-2400 16 p. |
artikel |
2 |
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks
|
Jiang, Yixin |
|
2007 |
|
11-12 |
p. 2428-2441 14 p. |
artikel |
3 |
Advances in performance evaluation of computer and telecommunications networking
|
Obaidat, Mohammad S. |
|
2002 |
|
11-12 |
p. 993-996 4 p. |
artikel |
4 |
Analysis of the effect of security on data and voice traffic in WLAN
|
Boulmalf, Mohammed |
|
2007 |
|
11-12 |
p. 2468-2477 10 p. |
artikel |
5 |
Analytical modeling of primary and secondary load as induced by video applications using UDP/IP
|
Wolfinger, B.E. |
|
2002 |
|
11-12 |
p. 1094-1102 9 p. |
artikel |
6 |
An applied research study for the provision of a QoS-oriented environment for voice and video services over satellite networks
|
Adami, Davide |
|
2002 |
|
11-12 |
p. 1113-1124 12 p. |
artikel |
7 |
An efficient intruder detection algorithm against sinkhole attacks in wireless sensor networks
|
Ngai, Edith C.H. |
|
2007 |
|
11-12 |
p. 2353-2364 12 p. |
artikel |
8 |
A new injection limitation mechanism for wormhole networks
|
Obaidat, M.S |
|
2002 |
|
11-12 |
p. 997-1008 12 p. |
artikel |
9 |
An implementation for ATM Adaptation Layer 5
|
Obaidat, M.S |
|
2002 |
|
11-12 |
p. 1103-1112 10 p. |
artikel |
10 |
A survey of key management schemes in wireless sensor networks
|
Xiao, Yang |
|
2007 |
|
11-12 |
p. 2314-2341 28 p. |
artikel |
11 |
Automated design of hierarchical intranets
|
Habib, Sami J. |
|
2002 |
|
11-12 |
p. 1066-1075 10 p. |
artikel |
12 |
Bandwidth allocation in a multiservice satellite network based on long-term weather forecast scenarios
|
Bolla, Raffaele |
|
2002 |
|
11-12 |
p. 1037-1046 10 p. |
artikel |
13 |
Decoupling different time scales of network QoS systems
|
Schmitt, Jens |
|
2002 |
|
11-12 |
p. 1047-1057 11 p. |
artikel |
14 |
Efficient group key management for multi-privileged groups
|
Wang, Guojun |
|
2007 |
|
11-12 |
p. 2497-2509 13 p. |
artikel |
15 |
Fault-resilient sensing in wireless sensor networks
|
Nakayama, Hidehisa |
|
2007 |
|
11-12 |
p. 2375-2384 10 p. |
artikel |
16 |
Geo-encryption protocol for mobile networks
|
Al-Fuqaha, Ala |
|
2007 |
|
11-12 |
p. 2510-2517 8 p. |
artikel |
17 |
IFC Editorial Board
|
|
|
2007 |
|
11-12 |
p. IFC- 1 p. |
artikel |
18 |
Investigating the performance of TCP in mobile ad hoc networks
|
Perkins, Dmitri D. |
|
2002 |
|
11-12 |
p. 1132-1139 8 p. |
artikel |
19 |
Minimizing re-routing in MPLS networks with preemption-aware constraint-based routing
|
Szviatovszki, Balázs |
|
2002 |
|
11-12 |
p. 1076-1084 9 p. |
artikel |
20 |
OBC - Contents
|
|
|
2007 |
|
11-12 |
p. OBC- 1 p. |
artikel |
21 |
Optimal branching factor for tree-based reliable multicast protocols
|
Maihöfer, Christian |
|
2002 |
|
11-12 |
p. 1018-1027 10 p. |
artikel |
22 |
Optimization network flow control and price coordination with feedback: proposal of a new distributed algorithm
|
Malinowski, Krzysztof |
|
2002 |
|
11-12 |
p. 1028-1036 9 p. |
artikel |
23 |
Pair-wise path key establishment in wireless sensor networks
|
Sheu, Jang-Ping |
|
2007 |
|
11-12 |
p. 2365-2374 10 p. |
artikel |
24 |
Performance analysis of multicast algorithms for mobile satellite communication networks 1 The views expressed in this article are those of the authors and do not reflect the official policy of the United States Air Force, Department of Defense or the U.S. Government. 1
|
Thomas, Ryan W |
|
2002 |
|
11-12 |
p. 1085-1093 9 p. |
artikel |
25 |
Performance evaluation and comparison of different ad hoc routing protocols
|
Trung, Ha Duyen |
|
2007 |
|
11-12 |
p. 2478-2496 19 p. |
artikel |
26 |
Providing distributed certificate authority service in cluster-based mobile ad hoc networks
|
Dong, Y. |
|
2007 |
|
11-12 |
p. 2442-2452 11 p. |
artikel |
27 |
QoS-driven multicast tree generation using Tabu search
|
Youssef, Habib |
|
2002 |
|
11-12 |
p. 1140-1149 10 p. |
artikel |
28 |
QUIPS-II: a simulation tool for the design and performance evaluation of Diffserv-based networks
|
Di, Zesong |
|
2002 |
|
11-12 |
p. 1125-1131 7 p. |
artikel |
29 |
SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks
|
Nasser, Nidal |
|
2007 |
|
11-12 |
p. 2401-2412 12 p. |
artikel |
30 |
Special issue on Security on Wireless Ad Hoc and Sensor Networks
|
Guizani, Sghaier |
|
2007 |
|
11-12 |
p. 2311-2313 3 p. |
artikel |
31 |
Token bucket characterization of long-range dependent traffic
|
Procissi, Gregorio |
|
2002 |
|
11-12 |
p. 1009-1017 9 p. |
artikel |
32 |
Toward secure and scalable time synchronization in ad hoc networks
|
Chen, Lin |
|
2007 |
|
11-12 |
p. 2453-2467 15 p. |
artikel |
33 |
TRAP: a high performance protocol for wireless local area networks
|
Nicopolitidis, P. |
|
2002 |
|
11-12 |
p. 1058-1065 8 p. |
artikel |
34 |
Trust-based security for wireless ad hoc and sensor networks
|
Boukerch, A. |
|
2007 |
|
11-12 |
p. 2413-2427 15 p. |
artikel |
35 |
Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks
|
Ssu, Kuo-Feng |
|
2007 |
|
11-12 |
p. 2342-2352 11 p. |
artikel |