All Stories

  1. Authenticity, Integrity, and Replay Protection in Quantum Data Communications and Networking
  2. 1. Quantum Applications - Fachbeitrag: The Quantum What? Advantage, Utopia or Threat?
  3. Indistinguishability and Non-deterministic Encryption of the Quantum Safe Multivariate Polynomial Public Key Cryptographic System
  4. Risky Zone Avoidance Strategies for Drones
  5. GPS-Free, Error Tolerant Path Planning for Swarms of Micro Aerial Vehicles with Quality Amplification ‡
  6. Resilience Estimation of Cyber-Physical Systems via Quantitative Metrics
  7. Capacity Requirements in Networks of Quantum Repeaters and Terminals
  8. Foundations and Practice of Security
  9. Tuning the demodulation frequency based on a normalized trajectory model for mobile underwater acoustic communications
  10. Protection of Quantum Data Communications
  11. Keyless Semi-Quantum Point-to-point Communication Protocol with Low Resource Requirements
  12. Secure Quantum Data Communications Using Classical Keying Material
  13. Low Frequency Mobile Communications in Underwater Networks
  14. Economic No-Key Semi-Quantum Direct Communication Protocol
  15. Learning to Communicate Underwater
  16. An Experimental Baseline for Underwater Acoustic Broadcasts
  17. Secure Localization in the Presence of Colluders in WSNs
  18. Management of Surveillance Underwater Acoustic Networks
  19. Delay and Reflection Attacks in Authenticated Semi-Quantum Direct Communications
  20. Simulation and modeling of hydro acoustic communication channels with wide band attenuation and ambient noise
  21. Channel selection using a multiple radio model
  22. Location-free link state routing for underwater acoustic sensor networks
  23. Simulation of underwater communications with a colored noise approximation and mobility
  24. Localization of a Mobile Node in Shaded Areas
  25. The Bidirectional Algorithm for Channel Selection Using a Two-Radio Model
  26. A new analysis of the cognitive radio jump-stay algorithm under the asymmetric model
  27. Revisiting the Performance of the Modular Clock Algorithm for Distributed Blind Rendezvous in Cognitive Radio Networks
  28. A new analytic model for the cognitive radio jump-stay algorithm
  29. QoS and security in Link State Routing protocols for MANETs
  30. Non-cooperating vehicle tracking in VANETs using the conditional logit model
  31. QaASs: QoS aware adaptive security scheme for video streaming in MANETs
  32. Tracking an on the run vehicle in a metropolitan VANET
  33. A multipath routing strategy to prevent flooding disruption attacks in link state routing protocols for MANETs
  34. QoS Aware Adaptive Security Scheme for Video Streaming in MANETs
  35. Point-to-point voice over ad hoc networks: A survey
  36. Security Issues in Link State Routing Protocols for MANETs
  37. Mobile Wireless Network Security
  38. Preventing the Cluster Formation Attack against the Hierarchical OLSR Protocol
  39. Simultaneous operation of multiple collocated radios and the scanning problem
  40. Mitigation of Flooding Disruption Attacks in Hierarchical OLSR Networks
  41. Secure geolocalization of wireless sensor nodes in the presence of misbehaving anchor nodes
  42. Mitigation of topology control traffic attacks in OLSR networks
  43. Solution to the wireless evil-twin transmitter attack
  44. Assessment of the true risks to the protection of confidential information in the wireless home and office environment
  45. Detection of the Evil ring attack in wireless sensor networks using cross verification
  46. Using time-of-day and location-based mobility profiles to improve scanning during handovers
  47. WIMAX/802.16 BROADBAND WIRELESS NETWORKS
  48. Prioritized Access for Emergency Stations in Next Generation Broadband Wireless Networks
  49. Security Threat Mitigation Trends in Low-Cost RFID Systems
  50. Centroid Localization of Uncooperative Nodes in Wireless Networks Using a Relative Span Weighting Method
  51. Location-Oblivious Distributed Unit Disk Graph Coloring
  52. Probabilistic Localization and Tracking of Malicious Insiders Using Hyperbolic Position Bounding in Vehicular Networks
  53. Secure Localization of Nodes in Wireless Sensor Networks with Limited Number of Truth Tellers
  54. Relative Span Weighted Localization of Uncooperative Nodes in Wireless Networks
  55. Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks
  56. Analysis of Threats to the Security of EPC Networks
  57. Security Threats on EPC Based RFID Systems
  58. Establishing a Communication Infrastructure in Ad Hoc Networks
  59. Strategies for fast scanning, ranging and handovers in WiMAX/802.16
  60. Voice quality measurement in a typical router-based network
  61. Strategies for fast scanning and handovers in WiMAX/802.16
  62. Rogue-base station detection in WiMax/802.16 wireless access networks
  63. Satellite transport protocol handling bit corruption, handoff and limited connectivity
  64. WiMax/802.16 threat analysis
  65. Ad-Hoc, Mobile, and Wireless Networks
  66. Integrating service discovery protocols with presence-based communications for ad hoc collaborative scenarios
  67. Performance evaluation of service discovery strategies in ad hoc networks
  68. Performance of generative programming based protocol implementation
  69. Ad-Hoc, Mobile, and Wireless Networks
  70. A method for the synthesis of controllers to handle safety, liveness, and real-time constraints
  71. An Efficient Algorithm for Controller Synthesis under Full Observation
  72. Planning control rules for reactive agents
  73. Specification and testing of the behavior of network management agents using SDL-92
  74. An algorithm for computing the mask value of the supremal normal sublanguage of a legal language
  75. An Approach to Conformance Testing of MIB Implementations
  76. Analysis and testing of application layer protocols with an application to FTAM
  77. The lotos model of a fault protected system and its verification using a petri net based approach
  78. FTAM test design using an automated test tool
  79. Wireless Data Communications
  80. Anomaly-based intrusion detection using mobility profiles of public transportation users
  81. Low-latency secure mobile communications
  82. Perfect identity concealment in UMTS over radio access links
  83. Bandwidth usage analysis of Service Location Protocol
  84. Implementation of two approaches for the reliable multicast of mobile agents over wireless networks
  85. Service discovery in a mobile agent API using SLP
  86. A multimedia on-line assistance system with safe remote control of applications
  87. A colored Petri net-based approach to the design of controllers
  88. A supervisory control theoretical approach to congestion management
  89. A comparison of two synthesis methods for timed discrete-event systems
  90. An object-oriented re-engineering of the remote procedure call, STREAMS and transport layer interface
  91. An evaluation of the TCT tool for the synthesis of controllers of discrete event systems
  92. Extension of the Karp and miller procedure to lotos specifications
  93. A computer-aided design tool for protocol testing