default search action
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Volume 4
Volume 4, Number 1, March 2013
- Edgar R. Weippl, A Min Tjoa, Simon Tjoa:
Frontiers in Security and Dependability. 1-3 - David Cadé, Bruno Blanchet:
From Computationally-Proved Protocol Specifications to Implementations and Application to SSH. 4-31 - Noura Al Ebri, Joonsang Baek, Abdulhadi Shoufan, Quang Hieu Vu:
Forward-Secure Identity-Based Signature: New Generic Constructions and Their Applications. 32-54 - Xihui Chen, Gabriele Lenzini, Sjouke Mauw, Jun Pang:
Design and Formal Analysis of A Group Signature Based Electronic Toll Pricing System. 55-75 - Stefan Craß, Tobias Dönz, Gerson Joskowicz, Eva Kühn, Alexander Marek:
Securing a Space-Based Service Architecture with Coordination-Driven Access Control. 76-97 - Raja Khurram Shahzad, Niklas Lavesson:
Comparative Analysis of Voting Schemes for Ensemble-based Malware Detection. 98-117 - Yutaka Matsuno, Shuichiro Yamamoto:
A Framework for Dependability Consensus Building and In-Operation Assurance. 118-134 - Rainer Poisel, Erich Malzer, Simon Tjoa:
Evidence and Cloud Computing: The Virtual Machine Introspection Approach. 135-152
Volume 4, Number 2, June 2013
- Pelin Angin, Bharat K. Bhargava:
An Agent-based Optimization Framework for Mobile-Cloud Computing. 1-17 - Weicheng Huai, Zhuzhong Qian, Xin Li, Gangyi Luo, Sanglu Lu:
Energy Aware Task Scheduling in Data Centers. 18-38 - Anis Bkakria, Frédéric Cuppens, Nora Cuppens-Boulahia, José M. Fernandez, David Gross-Amblard:
Preserving Multi-relational Outsourced Databases Confidentiality using Fragmentation and Encryption. 39-62 - Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani:
Clustering Models in Secure Clustered Multiparty Computation. 63-76 - Richard K. Lomotey, Ralph Deters:
Facilitating Multi-Device Usage in mHealth. 77-96 - Kensuke Baba, Serina Egawa:
On the Order of Search for Personal Identification with Biometric Images. 97-103 - Shuhui Hou, Ryôichi Sasaki, Tetsutaro Uehara, Siu-Ming Yiu:
Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation. 104-113
Volume 4, Number 3, September 2013
- Chia-Hsuan Chang, Chia-Lung Liu, Hsi-Lu Chao, Kuei-Li Huang, Yi-Bing Lin:
A Novel LIPA Scheme for LTE VoIP Services with Home eNBs. 1-22 - Sarada Prasad Gochhayat, Pallapa Venkataram:
Performance Analysis of a Priority based Resource Allocation Scheme in Ubiquitous Networks. 23-40 - Mayumi Takaya, Yusuke Tsuruta, Akihiro Yamamura:
Reverse Turing Test using Touchscreens and CAPTCHA. 41-57 - Atta Badii, Davide Carboni, Antonio Pintus, Andrea Piras, Alberto Serra, Marco Tiemann, Nagarajan Viswanathan:
CityScripts: Unifying Web, IoT and Smart City Services in a Smart Citizen Workspace. 58-78 - László Virág, József Kovács, András Edelmayer:
Interacting Advanced ITS Communications with Low-Power Sensor Networks. 79-96 - Antonio J. Jara, Latif Ladid, Antonio Fernandez Gómez-Skarmeta:
The Internet of Everything through IPv6: An Analysis of Challenges, Solutions and Opportunities. 97-118
Volume 4, Number 4, December 2013
- William R. Claycomb, Carly L. Huth:
A Method For Characterizing Sociotechnical Events Related to Insider Threat Sabotage. 1-19 - Philip A. Legg, Nick Moffat, Jason R. C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection. 20-37 - Christian W. Probst, René Rydhof Hansen:
Reachability-based Impact as a Measure for Insiderness. 38-48 - Dongwan Shin, Huiping Yao:
A User Study of Security Warnings for Detecting QR Code Based Attacks on Android Phone. 49-64 - Jian Xu, Yuxi Li, Jingwei Miao, Fucai Zhou:
The Electronic Cash Protocol Based on Dynamic Group Signature. 65-79 - Wonjun Cho, Youngho Park, Chul Sur, Kyung Hyune Rhee:
An Improved Privacy-Preserving Navigation Protocol in {VANET}s. 80-92 - Kunwar Singh, C. Pandu Rangan, A. K. Banerjee:
Lattice Based Efficient Threshold Public Key Encryption Scheme. 93-107 - Jiwan Seo, Seungjin Choi, Mucheol Kim, Sangyong Han:
The Method of Personalized Recommendation with Ensemble Combination. 108-121
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.