nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive and Flexible Smartphone Power Modeling
|
Nacci, A. A. |
|
2013 |
18 |
5 |
p. 600-609 |
artikel |
2 |
Adaptive Information Coding for Secure and Reliable Wireless Telesurgery Communications
|
Tozal, Mehmet Engin |
|
2011 |
18 |
5 |
p. 697-711 |
artikel |
3 |
A Privacy Preserving Method Using Privacy Enhancing Techniques for Location Based Services
|
Buchanan, William J. |
|
2012 |
18 |
5 |
p. 728-737 |
artikel |
4 |
A Sink-Oriented Layered Clustering Protocol for Wireless Sensor Networks
|
Mo, Yijun |
|
2013 |
18 |
5 |
p. 639-650 |
artikel |
5 |
Distributed Online Algorithms for the Agent Migration Problem in WSNs
|
Tziritas, Nikos |
|
2013 |
18 |
5 |
p. 622-638 |
artikel |
6 |
Editorial for Security and Privacy in Wireless Networks Special Issue
|
Rajarajan, Muttukrishnan |
|
2013 |
18 |
5 |
p. 664-665 |
artikel |
7 |
Modeling Mobility in Cooperative Ad Hoc Networks
|
Niewiadomska-Szynkiewicz, Ewa |
|
2013 |
18 |
5 |
p. 610-621 |
artikel |
8 |
Natural Disaster Monitoring with Wireless Sensor Networks: A Case Study of Data-intensive Applications upon Low-Cost Scalable Systems
|
Chen, Dan |
|
2013 |
18 |
5 |
p. 651-663 |
artikel |
9 |
Non-Interactive Authenticated Key Agreement over the Mobile Communication Network
|
Wu, Tzong-Sun |
|
2013 |
18 |
5 |
p. 594-599 |
artikel |
10 |
Performance of IEEE 802.11 under Jamming
|
Bayraktaroglu, Emrah |
|
2011 |
18 |
5 |
p. 678-696 |
artikel |
11 |
Reverse Authentication in Financial Transactions and Identity Management
|
Chen, Bangdao |
|
2012 |
18 |
5 |
p. 712-727 |
artikel |
12 |
“Security-Aware and Data Intensive Low-Cost Mobile Systems” Editorial
|
Kołodziej, Joanna |
|
2013 |
18 |
5 |
p. 591-593 |
artikel |
13 |
Trust-Based Routing Mechanism in MANET: Design and Implementation
|
Eissa, Tameem |
|
2011 |
18 |
5 |
p. 666-677 |
artikel |
14 |
Ubiquitous One-Time Password Service Using the Generic Authentication Architecture
|
Chen, Chunhua |
|
2011 |
18 |
5 |
p. 738-747 |
artikel |