Go home now Header Background Image
Submission Procedure
share: |
Follow us
Articles by Topics
Topic C. - Computer Systems Organization
Topic C.2.2 - Network Protocols

U. Aguilera, D. López-de-Ipiña:
A Semantically Enhanced Service Discovery for MANET
page 896 - 920
Vol.22 / Issue 12
S. Ajmal, A. Rasheed, A. Qayyum, A. Hasan:
Classification of VANET MAC, Routing and Approaches
A Detailed Survey
page 462 - 487
Vol.20 / Issue 4
G. Bella, E. Riccobene:
Formal Analysis of the Kerberos Authentication System
page 1337 - 1381
Vol.3 / Issue 12
B. Benyó, M.F. Hatwágner, T. Heckenast, K. Kovács, Á. Varga, N. Varjasi:
Design and Implementation of Enum-Based Services
page 1128 - 1138
Vol.12 / Issue 9
G. Blinowski, K. Szczypiorski:
Steganography in VLC Systems
page 454 - 478
Vol.23 / Issue 5
S. Boudjit, C. Adjih, P. Mühlethaler, A. Laouiti:
Duplicate Address Detection and Autoconfiguration in OLSR
page 4 - 31
Vol.13 / Issue 1
C. Campo, F. Almenárez, D. Díaz, C. García-Rubio, A.M. López:
Secure Service Discovery based on Trust Management for ad-hoc Networks
page 340 - 356
Vol.12 / Issue 3
Y. Dodis, P.J. Lee, D.H. Yum:
Optimistic Fair Exchange in a Multi-user Setting
page 318 - 346
Vol.14 / Issue 3
N. A. Elramly, A. S. Habib, O. S. Essa, H. M. Harb:
Analysis, Design, and Performance Evaluation of MS-RTCP: More Scalable Scheme for the Real-Time Control Protocol
page 874 - 897
Vol.11 / Issue 6
Y.H. Ho, A.H. Ho, K.A. Hua, F. Xie:
Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network
page 1090 - 1118
Vol.15 / Issue 5
H. Hojjat, H. Nakhost, M. Sirjani:
Integrating Module Checking and Deduction in a Formal Proof for the Perlman Spanning Tree Protocol (STP)
page 2076 - 2104
Vol.13 / Issue 13
C.-J. Huang, I.-F. Chen, K.-W. Hu, H.-Y. Shen, Y.-J. Chen, D.-X. Yang:
A Load Balancing and Congestion-Avoidance Routing Mechanism for Teal-Time Traffic over Vehicular Networks
page 2506 - 2527
Vol.15 / Issue 13
N. Hundewale, S. Jung, A. Zelikovsky:
Energy Efficient Node Caching and Load Balancing Enhancement of Reactive Ad Hoc Routing Protocols
page 110 - 132
Vol.13 / Issue 1
O. Koné:
An Inoteroperability Testing Approach to Wireless Applications Protocols
page 1220 - 1243
Vol.9 / Issue 10
S. Lafrance:
Symbolic Approach to the Analysis of Security Protocols
page 1156 - 1198
Vol.10 / Issue 9
S. Lafrance, J. Mullins:
An Information Flow Method to Detect Denial of Service Vulnerabilities
page 1350 - 1369
Vol.9 / Issue 11
S. Lee, H. Kim, C. Kim:
A Knowledge Discovery Agent for a Topology Bit-map in Ad Hoc Mobile Networks
page 1105 - 1117
Vol.14 / Issue 7
S. Ahmad Madani, D. Weber, S. Mahlknecht:
Position-based Routing Protocol for Low Power Wireless Sensor Networks
page 1215 - 1233
Vol.16 / Issue 9
R. Malik, R. Mühlfeld:
A Case Study in Verification of UML Statecharts: the PROFIsafe Protocol
page 138 - 151
Vol.9 / Issue 2
P. Martinez-Julia, A.F. Gómez-Skarmeta:
A Novel Identity-based Network Architecture for Next Generation Internet
page 1643 - 1661
Vol.18 / Issue 12
P. Matoušek:
Tools for Parametric Verification. A Comparison on a Case Study
page 1469 - 1494
Vol.10 / Issue 10
J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil:
Countermeasures to Prevent Misbehaviour in VANETs
page 857 - 873
Vol.18 / Issue 6
J. Molnár, S. Kirešová, T. Vince, D. Kováč, P. Jacko, M. Bereš, P. Hrabovský:
Weather Station IoT Educational Model Using Cloud Services
page 1495 - 1512
Vol.26 / Issue 11
H. Mousannif, I. Khalil, H. Al Moatassime:
Cooperation as a Service in VANETs
page 1202 - 1218
Vol.17 / Issue 8
S. Natesan, R. Krishnan:
Energy Efficient Composite Metric Based Routing Protocol for Internet of Things
page 1366 - 1381
Vol.26 / Issue 11
A. Nenadic, N. Zhang, B. Cheetham, C. Goble:
RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption
page 175 - 192
Vol.11 / Issue 1
D.-Q. Nguyen, P. Minet:
Quality of Service Routing in a MANET with OLSR
page 56 - 86
Vol.13 / Issue 1
H. Ning, H. Liu, Q. Liu, G. Ji:
Directed Path Based Authentication Scheme for the Internet of Things
page 1112 - 1131
Vol.18 / Issue 9
M. Qin, R. Zimmermann:
VCA: An Energy-Efficient Voting-Based Clustering Algorithm for Sensor Networks
page 87 - 109
Vol.13 / Issue 1
A. Ruiz-Martínez, C.I. Marín-López, L. Baño-López, A.F. Gómez-Skarmeta:
A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing
page 555 - 584
Vol.15 / Issue 3
K. Salah, M. Hamawi:
Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP
page 3299 - 3313
Vol.16 / Issue 21
P.I. Shah, P.A. Shah, S. Yasmin, Z. ur-Rehman, A. Ahmad, Y. Nam, S. Rho:
Crumbling Walls Log Quorum System-based Name Resolution Routing for CCN based IoT
page 1282 - 1305
Vol.24 / Issue 9
L. Shu, M. Hauswirth, Y. Zhang, J. Ma, G. Min, Y. Wang:
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
page 1343 - 1367
Vol.16 / Issue 10
K. Simon, C. Moucha, J. Keller:
Contactless Vulnerability Analysis using Google and Shodan
page 404 - 430
Vol.23 / Issue 4
P. Takács:
The Additional Examination of the Kudo-Mathuria Time-Release Protocol
page 1373 - 1384
Vol.12 / Issue 9
N. Theera-Umpon, K.-H. Han, W.-S. Bae, S. Lee, V.H. Pham:
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
page 1258 - 1270
Vol.24 / Issue 9
T. Vince, M. Bereš, I. Kováčová, J. Molnár, B. Fecko, J. Dziak, I. Tomčiková, M. Guzan:
IoT Implementation in Remote Measuring Laboratory VMLab Analyses
page 1402 - 1421
Vol.26 / Issue 11
S. Wendzel, F. Link, D. Eller, W. Mazurczyk:
Detection of Size Modulation Covert Channels Using Countermeasure Variation
page 1396 - 1416
Vol.25 / Issue 11
G. Yang, D.S. Wong, X. Deng:
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
page 441 - 462
Vol.14 / Issue 3
Z. Đurić, O. Marić, D. Gašević:
Internet Payment System: A New Payment System for Internet Transactions
page 479 - 503
Vol.13 / Issue 4