Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic C. - Computer Systems Organization
Topic C.2 - COMPUTER-COMMUNICATION NETWORKS
Topic C.2.0 - General

U. Aguilera, D. López-de-Ipiña:
A Semantically Enhanced Service Discovery for MANET
/jucs_22_7/a_semantically_enhanced_service
page 896 - 920
Vol.22 / Issue 12
F.A. Azzedin:
Classifying and Tracking Free Riders in Multimedia-Based Systems
/jucs_16_10/classifying_and_tracking_free
page 1368 - 1387
Vol.16 / Issue 10
S. Boudjit, C. Adjih, P. Mühlethaler, A. Laouiti:
Duplicate Address Detection and Autoconfiguration in OLSR
/jucs_13_1/duplicate_address_detection_and
page 4 - 31
Vol.13 / Issue 1
G. Cattaneo, G. De Maio, U. Ferraro Petrillo:
Security Issues and Attacks on the GSM Standard: a Review
/jucs_19_16/security_issues_and_attacks
page 2437 - 2452
Vol.19 / Issue 16
C.-L. Chen:
A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test
/jucs_15_2/a_new_detection_method
page 488 - 504
Vol.15 / Issue 2
T. Cui, C. Jin, G. Zhang:
Observations of Skipjack-like Structure with SP/SPS Round Function
/jucs_19_16/observations_of_skipjack_like
page 2453 - 2471
Vol.19 / Issue 16
B. Flinn, H. Maurer:
Levels of Anonymity
/jucs_1_1/levels_of_anonymity
page 35 - 47
Vol.1 / Issue 1
W. Frączek, W. Mazurczyk, K. Szczypiorski:
Multilevel Steganography: Improving Hidden Communication in Networks
/jucs_18_14/multilevel_steganography_improving_hidden
page 1967 - 1986
Vol.18 / Issue 14
S. Gharout, A. Bouabdallah, Y. Challal, M. Achemlal:
Adaptive Group Key Management Protocol for Wireless Communications
/jucs_18_6/adaptive_group_key_management
page 874 - 898
Vol.18 / Issue 6
J.M. Gimenez-Guzman, M.J. Domenech-Benlloch, V. Pla, V. Casares-Giner, J. Martinez-Bauset:
Guaranteeing Seamless Mobility with User Redials and Automatic Handover Retrials
/jucs_14_10/guaranteeing_seamless_mobility_with
page 1597 - 1624
Vol.14 / Issue 10
H. Hlavacs, W. Gansterer, H. Schabauer, J. Zottl, M. Petraschek, T. Hoeher, O. Jung:
Enhancing ZRTP by using Computational Puzzles
/jucs_14_5/enhancing_zrtp_by_using
page 693 - 716
Vol.14 / Issue 5
D. Won-Kyu Hong, C. Seon Hong, Y. Jae Hyoung, D.-S. Yun, W.-S. Kim:
Bounded Flooding Routing Algorithm for Provisioning the Globally Optimal Route in a Hierarchical ATM Network
/jucs_8_7/bounded_flooding_routing_algorithm
page 698 - 721
Vol.8 / Issue 7
I.R. Jeong, D.H. Lee:
Parallel Key Exchange
/jucs_14_3/parallel_key_exchange
page 377 - 396
Vol.14 / Issue 3
S. P. Joglekar, S. R. Tate:
ProtoMon: Embedded Monitors for Cryptographic Protocol Intrusion Detection and Prevention
/jucs_11_1/protomon_embedded_monitors_for
page 83 - 103
Vol.11 / Issue 1
I. Joe Khor, J. Thomas, I. Jonyer:
Sliding Window Protocol for Secure Group Communication in Ad-Hoc Networks
/jucs_11_1/sliding_window_protocol_for
page 37 - 55
Vol.11 / Issue 1
D. Koukopoulos:
Stability in Heterogeneous Multimedia Networks under Adversarial Attacks
/jucs_15_2/stability_in_heterogeneous_multimedia
page 444 - 464
Vol.15 / Issue 2
L. Krammer, W. Kastner, T. Sauter:
A Comprehensive Dependability Approach for Building Automation Networks
/jucs_22_9/a_comprehensive_dependability_approach
page 1225 - 1248
Vol.22 / Issue 9
G.R. Kumar, N. Mangathayaru, G. Narsimha:
An Approach for Intrusion Detection Using Novel Gaussian Based Kernel Function
/jucs_22_4/an_approach_for_intrusion
page 589 - 604
Vol.22 / Issue 4
J.O. Kwon, I.R. Jeong, D.H. Lee:
Light-Weight Key Exchange with Different Passwords in the Standard Model
/jucs_15_5/light_weight_key_exchange
page 1042 - 1064
Vol.15 / Issue 5
J. Luo, X. Wang, M. Yang:
A Resilient P2P Anonymous Routing Approach Employing Collaboration Scheme
/jucs_15_9/a_resilient_p2p_anonymous
page 1797 - 1811
Vol.15 / Issue 9
S. Ahmad Madani, D. Weber, S. Mahlknecht:
Position-based Routing Protocol for Low Power Wireless Sensor Networks
/jucs_16_9/position_bbased_routing_protocol
page 1215 - 1233
Vol.16 / Issue 9
J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil:
Countermeasures to Prevent Misbehaviour in VANETs
/jucs_18_6/countermeasures_to_prevent_misbehaviour
page 857 - 873
Vol.18 / Issue 6
D.-Q. Nguyen, P. Minet:
Quality of Service Routing in a MANET with OLSR
/jucs_13_1/quality_of_service_routing
page 56 - 86
Vol.13 / Issue 1
S. Pal:
Extending Mobile Cloud Platforms Using Opportunistic Networks: Survey, Classification and Open Issues
/jucs_21_12/extending_mobile_cloud_platforms
page 1594 - 1634
Vol.21 / Issue 12
Y. Park, C. Sur, S. Shin, K.-H. Rhee, C. Seo:
A Privacy Preserving Message Delivery Protocol Using Identity-Hidden Index in VDTNs
/jucs_19_16/a_privacy_preserving_message
page 2385 - 2403
Vol.19 / Issue 16
P. Pecho, F. Zboril Jr., M. Drahansky, P. Hanacek:
Agent Platform for Wireless Sensor Network with Support for Cryptographic Protocols
/jucs_15_5/agent_platform_for_wireless
page 992 - 1006
Vol.15 / Issue 5
F. Praus, W. Kastner, P. Palensky:
Secure Control Applications in Smart Homes and Buildings
/jucs_22_9/secure_control_applications_in
page 1249 - 1273
Vol.22 / Issue 9
C. Rechberger, V. Rijmen:
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
/jucs_14_3/new_results_on_nmac
page 347 - 376
Vol.14 / Issue 3
K. Salah, M. Hamawi:
Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP
/jucs_16_21/impact_of_cpu_bound
page 3299 - 3313
Vol.16 / Issue 21
K. Salah, M.-A.-R. Al-Khiaty, R. Ahmed, A. Mahdi:
Performance Evaluation of Snort under Windows 7 and Windows Server 2008
/jucs_17_11/performance_evaluation_of_snort
page 1605 - 1622
Vol.17 / Issue 11
A.U. Schmidt:
On the Superdistribution of Digital Goods
/jucs_15_2/on_the_superdistribution_of
page 401 - 425
Vol.15 / Issue 2
L. Shu, M. Hauswirth, Y. Zhang, J. Ma, G. Min, Y. Wang:
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
/jucs_16_10/cross_layer_optimization_for
page 1343 - 1367
Vol.16 / Issue 10
S. Soursos, C. Courcoubetis, R. Weber:
Dynamic Bandwidth Pricing: Provision Cost, Market Size, Effective Bandwidths and Price Games
/jucs_14_5/dynamic_bandwidth_pricing_provision
page 766 - 785
Vol.14 / Issue 5
A.V. Uzunov, E.B. Fernandez, K. Falkner:
Engineering Security into Distributed Systems: A Survey of Methodologies
/jucs_18_20/engineering_security_into_distributed
page 2920 - 3006
Vol.18 / Issue 20
X. Wang, L. Xu, S. Zhou, J.K. Liu:
A Resolving Set based Algorithm for Fault Identification in Wireless Mesh Networks
/jucs_21_3/a_resolving_set_based
page 384 - 405
Vol.21 / Issue 3
M.B. Yassein, Y. Khamayseh, M. AbuJazoh:
Feature Selection for Black Hole Attacks
/jucs_22_4/feature_selection_for_black
page 521 - 536
Vol.22 / Issue 4
H. Zhou, K.M. Hou, L. Gineste, C. De Vaulx, J. Ponsonnaille:
A New System Dedicated to Real-time Cardiac Arrhythmias Tele-assistance and Monitoring
/jucs_12_1/a_new_system_dedicated
page 30 - 44
Vol.12 / Issue 1