Mitigating Flooding Attacks on Mobility in Infrastructure-Based Vehicular...
Arieta, F., Barabasz, L.T., Santos, A., Nogueira, M.. 2014. Mitigating Flooding Attacks on Mobility in Infrastructure-Based Vehicular Networks. Latin America Transactions, IEEE (Revista IEEE America...
View ArticleDesign and implementation of a mobile VoIP system on Android
Luchian, E., Terebes, R., Cremene, M.. 2014. Design and implementation of a mobile VoIP system on Android. Electronics and Telecommunications (ISETC), 2014 11th International Symposium on. :1-4.
View ArticleSynergetic cloaking technique in wireless network for location privacy
Jagdale, B.N., Bakal, J.W.. 2014. Synergetic cloaking technique in wireless network for location privacy. Industrial and Information Systems (ICIIS), 2014 9th International Conference on. :1-6.
View ArticlePreserving location privacy based on distributed cache pushing
Ming Chen, Wenzhong Li, Zhuo Li, Sanglu Lu, Daoxu Chen. 2014. Preserving location privacy based on distributed cache pushing. Wireless Communications and Networking Conference (WCNC), 2014 IEEE....
View ArticleA lightweight mutual authentication mechanism for improving fast PMIPV6-based...
Ben Ameur, S., Zarai, F., Smaoui, S., Obaidat, M.S., Hsiao, K.F.. 2014. A lightweight mutual authentication mechanism for improving fast PMIPV6-based network mobility scheme. Network Infrastructure...
View ArticleOn Security-Effective and Global Mobility Management for FPMIPv6 Networks
Hyun-Suk Chai, Jun-dong Cho, Jongpil Jeong. 2014. On Security-Effective and Global Mobility Management for FPMIPv6 Networks. Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS),...
View ArticleEntity title architecture extensions towards advanced quality-oriented...
Silva, F., Castillo-Lema, J., Neto, A., Silva, F., Rosa, P., Corujo, D., Guimaraes, C., Aguiar, R.. 2014. Entity title architecture extensions towards advanced quality-oriented mobility control...
View ArticleIn-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile...
Bronzino, F., Chao Han, Yang Chen, Nagaraja, K., Xiaowei Yang, Seskar, I., Raychaudhuri, D.. 2014. In-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile Networks. Network...
View ArticleA group-based security protocol for Machine Type Communications in LTE-Advanced
Daesung Choi, Sungdae Hong, Hyoung-Kee Choi. 2014. A group-based security protocol for Machine Type Communications in LTE-Advanced. Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE...
View ArticleA lightweight mutual authentication mechanism for improving fast PMIPV6-based...
Ben Ameur, S., Zarai, F., Smaoui, S., Obaidat, M.S., Hsiao, K.F.. 2014. A lightweight mutual authentication mechanism for improving fast PMIPV6-based network mobility scheme. Network Infrastructure...
View ArticleOn Security-Effective and Global Mobility Management for FPMIPv6 Networks
Hyun-Suk Chai, Jun-dong Cho, Jongpil Jeong. 2014. On Security-Effective and Global Mobility Management for FPMIPv6 Networks. Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS),...
View ArticleEntity title architecture extensions towards advanced quality-oriented...
Silva, F., Castillo-Lema, J., Neto, A., Silva, F., Rosa, P., Corujo, D., Guimaraes, C., Aguiar, R.. 2014. Entity title architecture extensions towards advanced quality-oriented mobility control...
View ArticleIn-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile...
Bronzino, F., Chao Han, Yang Chen, Nagaraja, K., Xiaowei Yang, Seskar, I., Raychaudhuri, D.. 2014. In-Network Compute Extensions for Rate-Adaptive Content Delivery in Mobile Networks. Network...
View ArticleA group-based security protocol for Machine Type Communications in LTE-Advanced
Daesung Choi, Sungdae Hong, Hyoung-Kee Choi. 2014. A group-based security protocol for Machine Type Communications in LTE-Advanced. Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE...
View Article"Hiding User Privacy in Location Base Services through Mobile Collaboration"
S. Patil, S. Ramayane, M. Jadhav, P. Pachorkar. 2015. "Hiding User Privacy in Location Base Services through Mobile Collaboration". 2015 International Conference on Computational Intelligence and...
View ArticleSecure key management for 5G physical layer security
Mazin, A., Davaslioglu, K., Gitlin, R. D.. 2017. Secure key management for 5G physical layer security. 2017 IEEE 18th Wireless and Microwave Technology Conference (WAMICON). :1–5.
View ArticleA comparison of migration and multihoming support in IPv6 and XIA
Zhang, N., Sirbu, M. A., Peha, J. M.. 2017. A comparison of migration and multihoming support in IPv6 and XIA. 2017 International Symposium on Networks, Computers and Communications (ISNCC). :1–8.
View ArticleA Secure PMIPv6-Based Group Mobility Scheme for 6L0WPAN Networks
Qiu, Y., Ma, M.. 2017. A Secure PMIPv6-Based Group Mobility Scheme for 6L0WPAN Networks. 2017 IEEE International Conference on Communications (ICC). :1–6.
View ArticleOn Protecting Location Secrecy
Dai, W., Win, M. Z.. 2017. On Protecting Location Secrecy. 2017 International Symposium on Wireless Communication Systems (ISWCS). :31–36.
View ArticleVisiting Mobile Node Authentication Protocol for Proxy MIPv6-Based NEtwork...
Ameur, S. B., Smaoui, S., Zarai, F.. 2017. Visiting Mobile Node Authentication Protocol for Proxy MIPv6-Based NEtwork MObility. 2017 IEEE/ACS 14th International Conference on Computer Systems and...
View Article
More Pages to Explore .....