default search action
International Journal of Mobile Computing and Multimedia Communications, Volume 3
Volume 3, Number 1, 2011
- Anjali Sardana, Ramesh C. Joshi:
Dual-Level Attack Detection, Characterization and Response for Networks Under DDoS Attacks. 1-20 - Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic:
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. 21-34 - Holger Schmidt:
Threat and Risk-Driven Security Requirements Engineering. 35-50 - Sami J. Habib:
Analysis of Sensors' Coverage through Application-Specific WSN Provisioning Tool. 51-62 - Shuhaili Talib, Nathan L. Clarke, Steven Furnell:
Establishing A Personalized Information Security Culture. 63-79
Volume 3, Number 2, 2011
- Anna Vapen, Nahid Shahmehri:
2-clickAuth: Optical Challenge-Response Authentication Using Mobile Handsets. 1-18 - Mehdia E. Ajana, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi:
FlexRFID Middleware in the Supply Chain: Strategic Values and Challenges. 19-32 - Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia:
An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations. 33-51 - Allam Mousa:
Prioritization Schemes in Queuing Handoff and New Calls to Reduce Call Drops in Cellular Systems. 52-61 - Joel Penhoat, Karine Guillouard, Servane Bonjour, Pierrick Seite:
A Proposal for Enhancing the Mobility Management in the Future 3GPP Architectures. 62-81
Volume 3, Number 3, 2011
- Yaser M. Khamayseh, Muneer O. Bani Yassein, Iman I. Badran, Wail Mardini:
An Adaptive Backoff Algorithm for Mobile Ad-Hoc Networks. 1-19 - Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand, Ramesh Chandra Joshi, Manoj Misra:
Cooperative Caching in Mobile Ad Hoc Networks. 20-35 - Shailendra Mishra, Durg Singh Chauhan:
Resource Allocation for Multi Access MIMO Systems. 36-50 - Shashi Bhushan, Mayank Dave, R. B. Patel:
Reducing Network Overhead with Common Junction Methodology. 51-61 - Surender Kumar Soni, Vivek Katiyar, Narottam Chand:
An Energy-Efficient Multilevel Clustering Algorithm for Heterogeneous Wireless Sensor Networks. 62-79
Volume 3, Number 4, 2011
- Fatma-Zohra Chelali, Amar Djeradi:
Primary Research on Arabic Visemes, Analysis in Space and Frequency Domain. 1-19 - Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek:
On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security. 20-35 - Muazzan Binsaleh, Shahizan Hassan:
Systems Development Methodology for Mobile Commerce Applications. 36-52 - Prashant Kumar, Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand:
Enhancing Data Availability in MANETs with Cooperative Caching. 53-66 - Teddy Mantoro, Admir Milisic, Media A. Ayu:
: Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure. 67-83
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.