


default search action
6th Q2SWinet 2010: Bodrum, Turkey
- Mario Gerla, Matteo Cesana, Jalel Ben-Othman:

Q2SWinet'10, Proceedings of the Sixth ACM Symposium on QoS and Security for Wireless and Mobile Networks, Bodrum, Turkey, October 20-21, 2010. ACM 2010, ISBN 978-1-4503-0275-3
Quality of service in wireless broadband networks
- Yuichi Harada, Mayumi Komatsu, Tamaki Nakamura, Shigeo Shioda

, Shiro Sakata, Tutomu Murase:
Cross-layer approach for supporting QoS in IEEE802.11 DCF wireless LANs. 1-10 - Duygu Karaoglan, Albert Levi

, Erkay Savas:
A distributed key establishment scheme for wireless mesh networks using identity-based cryptography. 11-18 - Mourad Alia, Marc Lacoste, Ruan He, Frank Eliassen:

Putting together QoS and security in autonomic pervasive systems. 19-28 - Bafing Sambou, Fabrice Peyrard, Christian Fraboul:

Optimized HCCA schedulers for an IEEE 802.11e/AFDX hybrid network. 29-32
Security architectures for wireless sensor networks
- Azzedine Boukerche, Yonglin Ren, Lynda Mokdad:

Applying symmetric and asymmetric key algorithms for the security in wireless networks: proof of correctness. 33-40 - Robert Abo, Kamel Barkaoui, Hafedh Zayani

:
A probabilistic analysis of energy efficiency of wireless sensor network duty-cycled MAC protocols: application to S-MAC and Eco-MAC. 41-48 - Mohsen Karimzadeh Kiskani, Babak Hossein Khalaj, Shahin Vakilinia:

Delay QoS provisioning in cognitive radio systems using adaptive modulation. 49-54
Quality of service in wireless sensor networks
- Cédric Ramassamy, Hacène Fouchal

, Philippe Hunel, Nicolas Vidot:
A pragmatic testing approach for wireless sensor networks. 55-61 - M. Aykut Yigitel, Özlem Durmaz Incel, Cem Ersoy

:
Diff-MAC: a QoS-aware MAC protocol with differentiated services and hybrid prioritization for wireless multimedia sensor networks. 62-69 - Alexandros Zaharis, Adamantini Martini, Leonidas Perlepes

, Georgios I. Stamoulis, Panayotis Kikiras:
Live forensics framework for wireless sensor nodes using sandboxing. 70-77 - Christian Probst, Armin Veichtlbauer:

Security features of a generic sensor data acquisition system. 78-81
Security, trust and reputation in wireless ad hoc and mesh networks
- Vincenzo Gaglio, Alessandra De Paola

, Marco Ortolani, Giuseppe Lo Re:
A TRNG exploiting multi-source physical data. 82-89 - Wassim Itani, Ayman Tajeddine, Ayman I. Kayssi, Ali Chehab:

Slow but certain wins the race: authenticated bundle communication in delay tolerant networks. 90-97 - Gyözö Gódor, Péter Szendi, Sándor Imre

:
Elliptic curve cryptography based authentication protocol for small computational capacity RFID systems. 98-105 - Christos A. Papageorgiou, Konstantinos Birkos, Tasos Dagiuklas, Stavros A. Kotsopoulos:

Extending P2PSIP VoIP communication for ad hoc networks. 106-109

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














