All Stories

  1. A communication mechanism for use in underwater acoustic ad hoc networks.
  2. Authenticity, Integrity, and Replay Protection in Quantum Data Communications and Networking
  3. 1. Quantum Applications - Fachbeitrag: The Quantum What? Advantage, Utopia or Threat?
  4. Indistinguishability and Non-deterministic Encryption of the Quantum Safe Multivariate Polynomial Public Key Cryptographic System
  5. Risky Zone Avoidance Strategies for Drones
  6. GPS-Free, Error Tolerant Path Planning for Swarms of Micro Aerial Vehicles with Quality Amplification ‡
  7. Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics
  8. Capacity Requirements in Networks of Quantum Repeaters and Terminals
  9. Foundations and Practice of Security
  10. Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications
  11. Protection of Quantum Data Communications
  12. Keyless Semi-Quantum Point-to-point Communication Protocol with Low Resource Requirements
  13. Secure Quantum Data Communications Using Classical Keying Material
  14. Low Frequency Mobile Communications in Underwater Networks
  15. Economic No-Key Semi-Quantum Direct Communication Protocol
  16. Learning to Communicate Underwater
  17. An Experimental Baseline for Underwater Acoustic Broadcasts
  18. Secure Localization in the Presence of Colluders in WSNs
  19. Management of Surveillance Underwater Acoustic Networks
  20. Delay and Reflection Attacks in Authenticated Semi-Quantum Direct Communications
  21. Simulation and modeling of hydro acoustic communication channels with wide band attenuation and ambient noise
  22. Channel selection using a multiple radio model
  23. Location-free link state routing for underwater acoustic sensor networks
  24. Simulation of underwater communications with a colored noise approximation and mobility
  25. Localization of a Mobile Node in Shaded Areas
  26. The Bidirectional Algorithm for Channel Selection Using a Two-Radio Model
  27. A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model
  28. Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks
  29. A new analytic model for the cognitive radio jump-stay algorithm
  30. QoS and security in Link State Routing protocols for MANETs
  31. Non-cooperating vehicle tracking in VANETs using the conditional logit model
  32. QaASs: QoS aware adaptive security scheme for video streaming in MANETs
  33. Tracking an on the run vehicle in a metropolitan VANET
  34. A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs
  35. QoS Aware Adaptive Security Scheme for Video Streaming in MANETs
  36. Point-to-point voice over ad hoc networks: A survey
  37. Security Issues in Link State Routing Protocols for MANETs
  38. Mobile Wireless Network Security
  39. Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol
  40. Simultaneous operation of multiple collocated radios and the scanning problem
  41. Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks
  42. Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes
  43. Mitigation of topology control traffic attacks in OLSR networks
  44. Solution to the wireless evil-twin transmitter attack
  45. Assessment of the true risks to the protection of confidential information in the wireless home and office environment
  46. Detection of the Evil ring attack in wireless sensor networks using cross verification
  47. Using time-of-day and location-based mobility profiles to improve scanning during handovers
  48. WIMAX/802.16 BROADBAND WIRELESS NETWORKS
  49. Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks
  50. Security Threat Mitigation Trends in Low-Cost RFID Systems
  51. Centroid Localization of Uncooperative Nodes in Wireless Networks Using a Relative Span Weighting Method
  52. Location-Oblivious Distributed Unit Disk Graph Coloring
  53. Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks
  54. Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers
  55. Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks
  56. Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks
  57. Analysis of Threats to the Security of EPC Networks
  58. Security Threats on EPC Based RFID Systems
  59. Establishing a Communication Infrastructure in Ad Hoc Networks
  60. Strategies for fast scanning, ranging and handovers in WiMAX/802.16
  61. Voice quality measurement in a typical router-based network
  62. Strategies for fast scanning and handovers in WiMAX/802.16
  63. Rogue-base station detection in WiMax/802.16 wireless access networks
  64. Satellite transport protocol handling bit corruption, handoff and limited connectivity
  65. WiMax/802.16 threat analysis
  66. Ad-Hoc, Mobile, and Wireless Networks
  67. Integrating service discovery protocols with presence-based communications for ad hoc collaborative scenarios
  68. Performance evaluation of service discovery strategies in ad hoc networks
  69. Performance of generative programming based protocol implementation
  70. Ad-Hoc, Mobile, and Wireless Networks
  71. A method for the synthesis of controllers to handle safety, liveness, and real-time constraints
  72. An Efficient Algorithm for Controller Synthesis under Full Observation
  73. Planning control rules for reactive agents
  74. Specification and testing of the behavior of network management agents using SDL-92
  75. An algorithm for computing the mask value of the supremal normal sublanguage of a legal language
  76. An Approach to Conformance Testing of MIB Implementations
  77. Analysis and testing of application layer protocols with an application to FTAM
  78. The lotos model of a fault protected system and its verification using a petri net based approach
  79. FTAM test design using an automated test tool
  80. Wireless Data Communications
  81. Anomaly-based intrusion detection using mobility profiles of public transportation users
  82. Low-latency secure mobile communications
  83. Perfect identity concealment in UMTS over radio access links
  84. Bandwidth usage analysis of Service Location Protocol
  85. Implementation of two approaches for the reliable multicast of mobile agents over wireless networks
  86. Service discovery in a mobile agent API using SLP
  87. A multimedia on-line assistance system with safe remote control of applications
  88. A colored Petri net-based approach to the design of controllers
  89. A supervisory control theoretical approach to congestion management
  90. A comparison of two synthesis methods for timed discrete-event systems
  91. An object-oriented re-engineering of the remote procedure call, STREAMS and transport layer interface
  92. An evaluation of the TCT tool for the synthesis of controllers of discrete event systems
  93. Extension of the Karp and miller procedure to lotos specifications
  94. A computer-aided design tool for protocol testing