default search action
NTMS 2012: Istanbul, Turkey
- Albert Levi, Mohamad Badra, Matteo Cesana, Mona Ghassemian, Özgür Gürbüz, Nafaâ Jabeur, Marek Klonowski, Antonio Maña, Susana Sargento, Sherali Zeadally:
5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. IEEE 2012, ISBN 978-1-4673-0229-6 - Yosra Ben Saied, Alexis Olivereau, Maryline Laurent:
A Distributed Approach for Secure M2M Communications. 1-7 - Ebenezer Paintsil:
A Model for Privacy and Security Risks Analysis. 1-8 - Imen Jemili, Nader Chaabouni, Abdelfettah Belghith, Mohamed Mosbah:
A Multipath Layered Cluster Based Routing for Ad Hoc Networks. 1-5 - Arnab Raha, Mrinal Kanti Naskar, Arpita Chakraborty, Omar Alfandi, Dieter Hogrefe:
A Novel Indirect Trust Based Link State Routing Scheme Using a Robust Route Trust Method for Wireless Sensor Networks. 1-5 - Mikhail Zolotukhin, Timo Hämäläinen, Andrey Garnaev:
A Relay Deployment Mechanism for One Scenario of Cost-Effective Coverage Extension in IEEE 802.16j Networks. 1-6 - Spiros Louvros, Athanasios C. Iossifides, Konstantinos Aggelis, Agamemnon Baltagiannis, George Economou:
A Semi-Analytical Macroscopic MAC Layer Model for LTE Uplink. 1-5 - Sabrina Merkel, Sanaz Mostaghim, Hartmut Schmeck:
A Study of Mobility in Ad Hoc Networks and Its Effects on a Hop Count Based Distance Estimation. 1-5 - Mohammad Reza Faghani, Ashraf Matrawy, Chung-Horng Lung:
A Study of Trojan Propagation in Online Social Networks. 1-5 - Ali Hamlili:
A Topology-Based Approach to the Predictive Analysis of Intelligent Transportation Systems Dynamics. 1-5 - Hiroaki Higaki:
ABLA: Angle-Based Location Advertisement for Location-Based Ad-Hoc Routing Protocols. 1-5 - Christophe Betoule, Thomas Bonald, Remi Clavier, Dario Rossi, Giuseppe Rossini, Gilles Thouénon:
Adaptive Probabilistic Flooding for Multipath Routing. 1-6 - Leila Ben Saad, Bernard Tourancheau:
Address Allocation Scheme to Improve Lifetime of IPv6 Cluster-Based WSNs. 1-5 - Gurkan Tuna, Kayhan Gulez:
Aided Navigation Techniques for Indoor and Outdoor Unmanned Vehicles. 1-4 - Magnus Skjegstad, Frank T. Johnsen, Jørgen Nordmoen:
An Emulated Test Framework for Service Discovery and MANET Research Based on ns-3. 1-5 - Anas Showk, Shadi Traboulsi, Attila Bilgic:
An Energy Efficient Multi-Core Modem Architecture for LTE Mobile Terminals. 1-6 - Amar Siad:
Anonymous Identity-Based Encryption with Distributed Private-Key Generator and Searchable Encryption. 1-8 - Nicolas Sklavos, Paris Kitsos:
Architectural Optimizations & Hardware Implementations of WLANs Encryption Standard. 1-5 - El-Sayed M. El-Alfy:
Automatic Identification Based on Hand Geometry and Probabilistic Neural Networks. 1-5 - Erkay Savas, Cemal Yilmaz:
Cache Attacks: An Information and Complexity Theoretic Approach. 1-7 - Bogdan Pavkovic, Won-Joo Hwang, Fabrice Theoleyre:
Cluster-Directed Acyclic Graph Formation for IEEE 802.15.4 in Multihop Topologies. 1-6 - Nuray At, Jean-Luc Beuchat, Ismail San:
Compact Implementation of Threefish and Skein on FPGA. 1-5 - Jiva N. Bagale, John P. T. Moore, Antonio D. Kheirkhahzadeh, Peter Komisarczuk:
Comparison of Messaging Protocols for Emerging Wireless Networks. 1-5 - Mohammad Hassan Hajiesmaili, Ali Sehati, Ahmad Khonsari:
Content-Aware Rate Control for Video Transmission with Buffer Constraints in Multipath Networks. 1-5 - Marcel Heupel, Lars Fischer, Dogan Kesdogan, Mohamed Bourimi, Simon Scerri, Fabian Hermann, Rafael Giménez:
Context-Aware, Trust-Based Access Control for the di.me Userware. 1-6 - William G. Cassidy, Nabih Jaber, Kemal E. Tepe:
Cross Layer MAC and PHY Architecture for Collision Correction of DSRC Safety Messages. 1-5 - Ghalib A. Shah, Özgür B. Akan:
CSMA-Based Bandwidth Estimation for Cognitive Radio Sensor Networks. 1-5 - Karim Habak, Moustafa Youssef, Khaled A. Harras:
DBAS: A Deployable Bandwidth Aggregation System. 1-6 - Daniel Philip Venmani, Djamal Zeghlache, Yvon Gourhant:
Demystifying Link Congestion in 4G-LTE Backhaul Using OpenFlow. 1-8 - Sebastian Unger, Stefan Pfeiffer, Dirk Timmermann:
Dethroning Transport Layer Security in the Embedded World. 1-5 - Dongho Kwak, Hyeonmok Ko, Cheeha Kim:
Distributed Medium Access Scheduling for Wireless LANs. 1-5 - Peter Langendörfer, Krzysztof Piotrowski, Manuel Díaz, Bartolomé Rubio:
Distributed Shared Memory as an Approach for Integrating WSNs and Cloud Computing. 1-6 - Tansu Alpcan:
Dynamic Incentives for Risk Management. 1-5 - Zibouda Aliouat, Makhlouf Aliouat:
Effective Energy Management in Routing Protocol for Wireless Sensor Networks. 1-5 - Mohamed Lehsaini, Mohammed Feham, Hervé Guyennet:
Efficient Cluster-Based Fault-Tolerant Schemes for Wireless Sensor Networks. 1-5 - Davut Incebacak, Kemal Bicakci, Bülent Tavli:
Energy Cost of Mitigating Physical Attacks in Wireless Sensor Networks. 1-5 - Anya Apavatjrut:
Energy Efficient Optimization and Route Recovery for Gradient Broadcast Routing Protocol for Wireless Sensor Networks. 1-4 - Tafzeel ur Rehman Ahsin, Slimane Ben Slimane:
Energy Efficient Resource Allocation and Deployment Strategies for Wireless Networks. 1-5 - Syed Amjad Ali, Cüneyt Sevgi:
Energy Load Balancing for Fixed Clustering in Wireless Sensor Networks. 1-5 - Asmaa Seyam, Fahed Hasan Awad, Eyad Salah Taqieddin:
Energy-Efficient Clustering Algorithm for Wireless Sensor Networks Using the Virtual Field Force. 1-5 - Konstantin Mikhaylov, Jouni Tervonen:
Evaluation of Power Efficiency for Digital Serial Interfaces of Microcontrollers. 1-5 - Okoli Adaobi, Ejiro Igbesoko, Mona Ghassemian:
Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organised Networks. 1-5 - Ndeye Amy Dieng, Claude Chaudet, Maurice Charbit, Laurent Toutain, Tayeb Ben Meriem:
Experiments on the RSSI as a Range Estimator for Indoor Localization. 1-5 - Nikos Fotiou, Giannis F. Marias, George C. Polyzos:
Fighting Phishing the Information-Centric Way. 1-5 - Luca Pino, George Spanoudakis:
Finding Secure Compositions of Software Services: Towards a Pattern Based Approach. 1-5 - John P. T. Moore, Jiva N. Bagale, Antonio D. Kheirkhahzadeh, Peter Komisarczuk:
Fingerprinting Seismic Activity across an Internet of Things. 1-6 - Zayneb Trabelsi Ayoub, Sofiane Ouni, Farouk Kamoun:
Global versus Local Re-Association Approach to Extend the Lifetime of Large-Scale IEEE 802.15.4/ZigBee Wireless Sensor Networks. 1-5 - Konstantinos V. Katsaros, George Xylomenos, George C. Polyzos:
GlobeTraff: A Traffic Workload Generator for the Performance Evaluation of Future Internet Architectures. 1-5 - Takumi Kanaya, Akihito Hiromori, Hirozumi Yamaguchi, Teruo Higashino:
HumanS: A Human Mobility Sensing Simulator. 1-4 - Ramachandra Budihal, Hirisave S. Jamadagni:
Implementation and Benchmarking of CUSUM Algorithm for Spectrum Sensing under Low SNR Regimes on ANRC Cognitive Radio Testbed. 1-6 - Olivier Heen, Christoph Neumann, Luis A. Montalvo, Serge Defrance:
Improving the Resistance to Side-Channel Attacks on Cloud Storage Services. 1-5 - Nafaâ Jabeur, Sherali Zeadally, Sergey Maydebura:
Improving Trust and Privacy Models in Social Networks. 1-5 - Maicon Stihler, Altair Olivo Santin, Arlindo L. Marcon Jr., Joni da Silva Fraga:
Integral Federated Identity Management for Cloud Computing. 1-5 - Vesa P. Hytönen, Aleksandr Puchko, Thomas Höhne, Thomas Chapman:
Introduction of Multiflow for HSDPA. 1-5 - Kanwalinderjit Kaur Gagneja, Kendall E. Nygard:
Key Management Scheme for Routing in Clustered Heterogeneous Sensor Networks. 1-5 - Markus Kerper, Christian Wewetzer, Andreas Sasse, Martin Mauve:
Learning Traffic Light Phase Schedules from Velocity Profiles in the Cloud. 1-5 - Magnus Skjegstad, Frank T. Johnsen, Trude Hafsøe Bloebaum, Torleiv Maseng:
Mist: A Reliable and Delay-Tolerant Publish/Subscribe Solution for Dynamic Networks. 1-8 - Gurkan Tuna, Kayhan Gulez, Tarik Veli Mumcu, Vehbi C. Gungor:
Mobile Robot Aided Self-Deploying Wireless Sensor Networks for Radiation Leak Detection. 1-5 - Borislava Gajic, Jesús Palenzuela, Janne Riihijärvi, Petri Mähönen:
Mobility-Aware Topology Manager for Publish-Subscribe Networks. 1-5 - Kuzman Katkalov, Nina Moebius, Kurt Stenzel, Marian Borek, Wolfgang Reif:
Model-Driven Testing of Security Protocols with SecureMDD. 1-5 - Hasan T. Karaoglu, Mehmet Burak Akgun, Mehmet Hadi Günes, Murat Yuksel:
Multi Path Considerations for Anonymized Routing: Challenges and Opportunities. 1-5 - Emna Trigui, Moez Esseghir, Leïla Merghem-Boulahia:
Multi-Agent Systems Negotiation Approach for Handoff in Mobile Cognitive Radio Networks. 1-5 - Tassos Dimitriou, Antonis Michalas:
Multi-Party Trust Computation in Decentralized Environments. 1-5 - Yi Jun He, Tat Wing Chim, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Non-Transferable Proxy Re-Encryption Scheme. 1-4 - Qizhi Tian, Sorin A. Huss:
On Clock Frequency Effects in Side Channel Attacks of Symmetric Block Ciphers. 1-5 - Mouna Abdelmoumen, Imen Arfaoui, Mounir Frikha, Tijani Chahed:
On the Performance of MANETs under Different Mobility Patterns and Routing Protocols and Its Improvement Based on Fixed Relay Nodes. 1-5 - Tauseef Jamal, Paulo Mendes, André Zúquete:
Opportunistic Relay Selection for Wireless Cooperative Network. 1-4 - Johannes Braun, Johannes Buchmann:
Perfect Confidentiality Network: A Solution for Information Theoretically Secure Key Agreement. 1-5 - Thomas Potsch, Koojana Kuladinithi, Markus Becker, Peter Trenkamp, Carmelita Görg:
Performance Evaluation of CoAP Using RPL and LPL in TinyOS. 1-5 - M. G. Samantha Sriyananda, Jyrki Joutsensalo, Timo Hämäläinen:
Performance of OFDM with Blind Interference Suppression Schemes. 1-6 - Aleksandr Puchko, Mikhail Zolotukhin, Vesa P. Hytönen, Thomas Höhne, Thomas Chapman:
Phase Adjustment in HS-SFN for HSDPA. 1-5 - Jari Kellokoski, Joonas Koskinen, Timo Hämäläinen:
Power Consumption Analysis of the Always-Best-Connected User Equipment. 1-5 - Sandra Frei, Woldemar F. Fuhrmann, Andreas Rinkel, Bogdan V. Ghita:
Prospects for WLAN in the Evolved Packet Core Environment. 1-5 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis. 1-7 - Jari Kellokoski, Joonas Koskinen, Timo Hämäläinen:
Real-Life Performance Analysis of Always-Best-Connected Network. 1-5 - M. Sarper Gokturk, Özgür Gürbüz, Elza Erkip:
RECOMAC: A Cross-Layer Cooperative Network Protocol for Wireless Ad Hoc Networks. 1-7 - Carsten Rudolph, Andreas Fuchs:
Redefining Security Engineering. 1-6 - Sari Haj Hussein:
Refining a Quantitative Information Flow Metric. 1-7 - Seyed Mostafa Rezvani, Seyed Hamid Safavi, Ramezan Ali Sadegh Zadeh, Afrooz Haghbin, Reyhaneh Davarpanah:
Relay Power Minimization Approach Based on General-Rank Beamforming for Multi-Antenna Relaying Schemes. 1-5 - Telesphore Tiendrebeogo, Daouda Ahmat, Damien Magoni:
Reliable and Scalable Distributed Hash Tables Harnessing Hyperbolic Coordinates. 1-6 - Andre Marques Poersch, Daniel F. Macedo, José Marcos S. Nogueira:
Resource Location for Opportunistic Networks. 1-5 - Anil Kumar Chorppath, Tansu Alpcan:
Risk Management for IT Security: When Theory Meets Practice. 1-5 - Georgios V. Lioudakis, Angelos-Christos G. Anadiotis, Aziz S. Mousas, Charalampos Z. Patrikakis, Dimitra I. Kaklamani, Iakovos S. Venieris:
Routing in Content-Centric Networks: From Names to Concepts. 1-5 - Dania Abed Rabbou, Abderrahmen Mtibaa, Khaled A. Harras:
SCOUT: Social Context-Aware Ubiquitous System. 1-6 - Gianmarco Baldini, Valentin Rakovic, Vladimir Atanasovski, Liljana Gavrilovska:
Security Aspects of Policy Controlled Cognitive Radio. 1-5 - Khaled Hamouid, Kamel Adi:
Self-Certified Based Trust Establishment Scheme in Ad-Hoc Networks. 1-7 - Julian P. Murphy, Máire O'Neill, Frank P. Burns, Alexandre V. Bystrov, Alexandre Yakovlev, Basel Halak:
Self-Timed Physically Unclonable Functions. 1-5 - Sauro Longhi, Davide Marzioni, Emanuele Alidori, Gianluca Di Buo, Mariorosario Prist, Massimo Grisostomi, Matteo Pirro:
Solid Waste Management Architecture Using Wireless Sensor Network Technology. 1-5 - Huiming Anna Yu, Jonathan Rann, Justin Zhan:
SUCH: A Cloud Computing Management Tool. 1-4 - Cagatay Sonmez, Sinan Isik, Mehmet Yunus Donmez, Özlem Durmaz Incel, Cem Ersoy:
SUIT: A Cross Layer Image Transport Protocol with Fuzzy Logic Based Congestion Control for Wireless Multimedia Sensor Networks. 1-6 - Zafar Kazmi, Toni Felguera, Jorge Aguila Vila, Mario Maawad Marcos:
TASAM - Towards the Smart Devices App-Stores Applications Security Management Related Best Practices. 1-5 - Kheira Dari Bekara, Maryline Laurent, Than Ha Nguyen:
Technical Enforcement of European Privacy Legislation: An Access Control Approach. 1-7 - Anthony Busson, Bijan Jabbari, Alireza Babaei, Véronique Vèque:
Throughput Limits in Spectrum Sensing Cognitive Radio Networks Using Point Processes. 1-8 - Asma Amraoui, Fatima Zohra Benidriss, Badr Benmammar, Francine Krief, Fethi Tarik Bendimerad:
Toward Cognitive Radio Resource Management Based on Multi-Agent Systems for Improvement of Real-Time Application Performance. 1-4 - Nabil Sahli, Nafaâ Jabeur, Ijaz Muhammad Khan, Mohamad Badra:
Towards a Generic Framework for Wireless Sensor Network Multi-Criteria Routing. 1-6 - Bahia Zebbane, Manel Chenait, Nadjib Badache:
Towards an Energy-Efficient Algorithm Based Sleep-Scheduling for Wireless Sensor Networks. 1-4 - Volkmar Lotz, Samuel Paul Kaluvuri, Francesco Di Cerbo, Antonino Sabetta:
Towards Security Certification Schemas for the Internet of Services. 1-5 - Hajer Al Housani, Hadi Otrok, Rabeb Mizouni, Jean-Marc Robert, Azzam Mourad:
Towards Smart Anti-Malwares for Battery-Powered Devices. 1-4 - Zoya Dyka, Peter Langendörfer, Frank Vater, Steffen Peter:
Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF(2k). 1-6 - Nabih Jaber, William G. Cassidy, Esam Abdel-Raheem, Kemal E. Tepe:
Vehicular Broadcast Messaging Reliability Enhancement Protocol for Emergency Vehicle Communications. 1-4 - Said El Brak, Mohammed Bouhorma, Anouar Abdelhakim Boudhir:
VoIP over VANETs (VoVAN): A QoS Measurements Analysis of Inter-Vehicular Voice Communication in Urban Scenario. 1-6 - Dimitrios Zorbas, Tahiry Razafindralambo:
Wireless Sensor Network Redeployment under the Target Coverage Constraint. 1-5
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.