Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic C. - Computer Systems Organization
Topic C.2 - COMPUTER-COMMUNICATION NETWORKS
Topic C.2.2 - Network Protocols

U. Aguilera, D. López-de-Ipiña:
A Semantically Enhanced Service Discovery for MANET
/jucs_22_7/a_semantically_enhanced_service
page 896 - 920
Vol.22 / Issue 12
S. Ajmal, A. Rasheed, A. Qayyum, A. Hasan:
Classification of VANET MAC, Routing and Approaches
A Detailed Survey
/jucs_20_4/classification_of_vanet_mac
page 462 - 487
Vol.20 / Issue 4
G. Bella, E. Riccobene:
Formal Analysis of the Kerberos Authentication System
/jucs_3_12/formal_analysis_of_the
page 1337 - 1381
Vol.3 / Issue 12
B. Benyó, M.F. Hatwágner, T. Heckenast, K. Kovács, Á. Varga, N. Varjasi:
Design and Implementation of Enum-Based Services
/jucs_12_9/design_and_implementation_of
page 1128 - 1138
Vol.12 / Issue 9
G. Blinowski, K. Szczypiorski:
Steganography in VLC Systems
/jucs_23_5/steganography_in_vlc_systems
page 454 - 478
Vol.23 / Issue 5
S. Boudjit, C. Adjih, P. Mühlethaler, A. Laouiti:
Duplicate Address Detection and Autoconfiguration in OLSR
/jucs_13_1/duplicate_address_detection_and
page 4 - 31
Vol.13 / Issue 1
C. Campo, F. Almenárez, D. Díaz, C. García-Rubio, A.M. López:
Secure Service Discovery based on Trust Management for ad-hoc Networks
/jucs_12_3/secure_service_discovery_based
page 340 - 356
Vol.12 / Issue 3
Y. Dodis, P.J. Lee, D.H. Yum:
Optimistic Fair Exchange in a Multi-user Setting
/jucs_14_3/optimistic_fair_exchange_in
page 318 - 346
Vol.14 / Issue 3
N. A. Elramly, A. S. Habib, O. S. Essa, H. M. Harb:
Analysis, Design, and Performance Evaluation of MS-RTCP: More Scalable Scheme for the Real-Time Control Protocol
/jucs_11_6/analysis_design_and_performance
page 874 - 897
Vol.11 / Issue 6
Y.H. Ho, A.H. Ho, K.A. Hua, F. Xie:
Cooperation Enforcement in a Highly Dynamic Mobile Ad Hoc Network
/jucs_15_5/cooperation_enforcement_in_a
page 1090 - 1118
Vol.15 / Issue 5
H. Hojjat, H. Nakhost, M. Sirjani:
Integrating Module Checking and Deduction in a Formal Proof for the Perlman Spanning Tree Protocol (STP)
/jucs_13_13/integrating_module_checking_and
page 2076 - 2104
Vol.13 / Issue 13
C.-J. Huang, I.-F. Chen, K.-W. Hu, H.-Y. Shen, Y.-J. Chen, D.-X. Yang:
A Load Balancing and Congestion-Avoidance Routing Mechanism for Teal-Time Traffic over Vehicular Networks
/jucs_15_13/a_load_balancing_and
page 2506 - 2527
Vol.15 / Issue 13
N. Hundewale, S. Jung, A. Zelikovsky:
Energy Efficient Node Caching and Load Balancing Enhancement of Reactive Ad Hoc Routing Protocols
/jucs_13_1/energy_efficient_node_caching
page 110 - 132
Vol.13 / Issue 1
O. Koné:
An Inoteroperability Testing Approach to Wireless Applications Protocols
/jucs_9_10/an_inoteroperability_testing_approach
page 1220 - 1243
Vol.9 / Issue 10
S. Lafrance:
Symbolic Approach to the Analysis of Security Protocols
/jucs_10_9/symbolic_approach_to_the
page 1156 - 1198
Vol.10 / Issue 9
S. Lafrance, J. Mullins:
An Information Flow Method to Detect Denial of Service Vulnerabilities
/jucs_9_11/an_information_flow_method
page 1350 - 1369
Vol.9 / Issue 11
S. Lee, H. Kim, C. Kim:
A Knowledge Discovery Agent for a Topology Bit-map in Ad Hoc Mobile Networks
/jucs_14_7/a_knowledge_discovery_agent
page 1105 - 1117
Vol.14 / Issue 7
S. Ahmad Madani, D. Weber, S. Mahlknecht:
Position-based Routing Protocol for Low Power Wireless Sensor Networks
/jucs_16_9/position_bbased_routing_protocol
page 1215 - 1233
Vol.16 / Issue 9
R. Malik, R. Mühlfeld:
A Case Study in Verification of UML Statecharts: the PROFIsafe Protocol
/jucs_9_2/a_case_study_in
page 138 - 151
Vol.9 / Issue 2
P. Martinez-Julia, A.F. Gómez-Skarmeta:
A Novel Identity-based Network Architecture for Next Generation Internet
/jucs_18_12/a_novel_identity_based
page 1643 - 1661
Vol.18 / Issue 12
P. Matoušek:
Tools for Parametric Verification. A Comparison on a Case Study
/jucs_10_10/tools_for_parametric_verification
page 1469 - 1494
Vol.10 / Issue 10
J. Molina-Gil, P. Caballero-Gil, C. Caballero-Gil:
Countermeasures to Prevent Misbehaviour in VANETs
/jucs_18_6/countermeasures_to_prevent_misbehaviour
page 857 - 873
Vol.18 / Issue 6
J. Molnár, S. Kirešová, T. Vince, D. Kováč, P. Jacko, M. Bereš, P. Hrabovský:
Weather Station IoT Educational Model Using Cloud Services
/jucs_26_11/weather_station_iot_educational
page 1495 - 1512
Vol.26 / Issue 11
H. Mousannif, I. Khalil, H. Al Moatassime:
Cooperation as a Service in VANETs
/jucs_17_8/cooperation_as_a_service
page 1202 - 1218
Vol.17 / Issue 8
S. Natesan, R. Krishnan:
Energy Efficient Composite Metric Based Routing Protocol for Internet of Things
/jucs_26_11/energy_efficient_composite_metric
page 1366 - 1381
Vol.26 / Issue 11
A. Nenadic, N. Zhang, B. Cheetham, C. Goble:
RSA-based Certified Delivery of E-Goods Using Verifiable and Recoverable Signature Encryption
/jucs_11_1/rsa_based_certified_delivery
page 175 - 192
Vol.11 / Issue 1
D.-Q. Nguyen, P. Minet:
Quality of Service Routing in a MANET with OLSR
/jucs_13_1/quality_of_service_routing
page 56 - 86
Vol.13 / Issue 1
H. Ning, H. Liu, Q. Liu, G. Ji:
Directed Path Based Authentication Scheme for the Internet of Things
/jucs_18_9/directed_path_based_authentication
page 1112 - 1131
Vol.18 / Issue 9
M. Qin, R. Zimmermann:
VCA: An Energy-Efficient Voting-Based Clustering Algorithm for Sensor Networks
/jucs_13_1/vca_an_energy_efficient
page 87 - 109
Vol.13 / Issue 1
A. Ruiz-Martínez, C.I. Marín-López, L. Baño-López, A.F. Gómez-Skarmeta:
A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing
/jucs_15_3/a_new_fair_nonrepudiation
page 555 - 584
Vol.15 / Issue 3
K. Salah, M. Hamawi:
Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP
/jucs_16_21/impact_of_cpu_bound
page 3299 - 3313
Vol.16 / Issue 21
P.I. Shah, P.A. Shah, S. Yasmin, Z. ur-Rehman, A. Ahmad, Y. Nam, S. Rho:
Crumbling Walls Log Quorum System-based Name Resolution Routing for CCN based IoT
/jucs_24_9/crumbling_walls_log_quorum
page 1282 - 1305
Vol.24 / Issue 9
L. Shu, M. Hauswirth, Y. Zhang, J. Ma, G. Min, Y. Wang:
Cross Layer Optimization for Data Gathering in Wireless Multimedia Sensor Networks within Expected Network Lifetime
/jucs_16_10/cross_layer_optimization_for
page 1343 - 1367
Vol.16 / Issue 10
K. Simon, C. Moucha, J. Keller:
Contactless Vulnerability Analysis using Google and Shodan
/jucs_23_4/contactless_vulnerability_analysis_using
page 404 - 430
Vol.23 / Issue 4
P. Takács:
The Additional Examination of the Kudo-Mathuria Time-Release Protocol
/jucs_12_9/the_additional_examination_of%20
page 1373 - 1384
Vol.12 / Issue 9
N. Theera-Umpon, K.-H. Han, W.-S. Bae, S. Lee, V.H. Pham:
Verifying Secure Authentication Protocol for Communication between IoT-based Medical Devices
/jucs_24_9/verifying_secure_authentication_protocol
page 1258 - 1270
Vol.24 / Issue 9
T. Vince, M. Bereš, I. Kováčová, J. Molnár, B. Fecko, J. Dziak, I. Tomčiková, M. Guzan:
IoT Implementation in Remote Measuring Laboratory VMLab Analyses
/jucs_26_11/iot_implementation_in_remote
page 1402 - 1421
Vol.26 / Issue 11
S. Wendzel, F. Link, D. Eller, W. Mazurczyk:
Detection of Size Modulation Covert Channels Using Countermeasure Variation
/jucs_25_11/detection_of_size_modulation
page 1396 - 1416
Vol.25 / Issue 11
G. Yang, D.S. Wong, X. Deng:
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
/jucs_14_3/formal_security_definition_and
page 441 - 462
Vol.14 / Issue 3
Z. Đurić, O. Marić, D. Gašević:
Internet Payment System: A New Payment System for Internet Transactions
/jucs_13_4/internet_payment_system_a
page 479 - 503
Vol.13 / Issue 4