


default search action
3rd Q2SWinet 2007: Chania, Crete Island, Greece
- Hsiao-Hwa Chen, Luciano Bononi:

Q2SWinet'07 - Proceedings of the Third ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Chania, Crete Island, Greece, October 22, 2007. ACM 2007, ISBN 978-1-59593-806-0
QoS scheduling and multimedia
- Ingrid Juliana Niño

, Carlos Miguel Tavares Calafate
, Juan-Carlos Cano
, Pietro Manzoni
:
Assessing the effectiveness of longest-in-system (lis) schedulingin ad hoc networks. 1-7 - Gennaro Boggia, Pietro Camarda, Luigi Alfredo Grieco, Giuseppe Tomasicchio:

A dynamic bandwidth allocation algorithm for supporting real-time applications in 802.15.3 wpans. 8-15 - Alessandro Andreadis, Riccardo Zambon:

Qos enhancement for multimedia traffics with dynamic txoplimit in ieee 802.11e. 16-22
QoS routing in ad hoc and sensor networks
- Filipe Abrantes, Manuel Ricardo

:
A simulation study of xcp-b performance in wireless multi-hop networks. 23-30 - Luminita Moraru

, Pierre Leone, Sotiris E. Nikoletseas, José D. P. Rolim:
Near optimal geographic routing with obstacle avoidance in wireless sensor networks by fast-converging trust-based algorithms. 31-38 - Lei Huang, Li Lei, Lixiang Liu, Haibin Zhang, Linsha Tang:

Stimulating cooperation in route discovery of ad hoc networks. 39-46
QoS multicast and mobility
- Vitor Jesus

, Susana Sargento
, Miguel Almeida, Daniel Corujo
, Rui L. Aguiar
, Janusz Gozdecki, Gustavo Carneiro
, Albert Banchs, Pablo Yáñez-Mingot:
Integration of mobility and qos in 4g scenarios. 47-54 - Yan Cheng, J. William Atwood:

Performance evaluation of qos-agent assisted mipv6 handoff scheme. 55-62 - Andrey I. Lyakhov, Vladimir M. Vishnevsky

, Mikhail Yakimov:
Multicast qos support in ieee 802.16. 63-70
Anonymity and authentication
- Maryna Komarova, Michel Riguidel:

Optimized ticket distribution scheme for fast re-authentication protocol (fap). 71-77 - Alireza A. Nezhad, Dimitris Makrakis, Ali Miri:

Anonymous topology discovery for multihop wireless sensor networks. 78-85 - Azzedine Boukerche, Yonglin Ren:

A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks. 86-94
Secure synchronization and attacks management
- Ghada Alnifie, Robert Simon:

A multi-channel defense against jamming attacks in wireless sensor networks. 95-104 - David Sanchez:

Secure, accurate and precise time synchronization for wireless sensor networks. 105-112 - Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini:

Methodologies and frameworks for testing ids in adhoc networks. 113-122
Group key and identity management
- Junbeom Hur, Young-joo Shin

, Hyunsoo Yoon:
Decentralized group key management for dynamic networks using proxy cryptography. 123-129 - Swapnil Pathare, Sukumar Nandi

:
Sahnet: a secure system for ad-hoc networking using ecc. 130-135 - Joseph Chee Ming Teo, Chik How Tan:

Denial-of-service resilience password-based group key agreement for wireless networks. 136-143
Poster session
- Sewook Oh, Seong Rae Park:

Providing qos for streaming traffic in mobile network with mobile router. 144-147 - Gerardo Gómez

, Javier Poncela-González
, M. Carmen Aguayo-Torres
, José F. Paris
, José T. Entrambasaguas
:
Qos modeling for performance evaluation over evolved 3g networks. 148-151 - Asmaa Adnane

, Rafael T. de Sousa Jr.
, Christophe Bidan, Ludovic Mé:
Integrating trust reasonings into node behavior in olsr. 152-155 - Vasileios Karyotis

, Symeon Papavassiliou:
On the malware spreading over non-propagative wireless ad hoc networks: the attacker's perspective. 156-159 - Anis Zouari, Karine Guillouard, Jean-Marie Bonnin:

A performance analysis of distributed qos negotiation during session establishment. 160-163 - Jérôme Lebegue, Christophe Bidan, Thierry Plesse:

Security of predefined groups in manets. 164-167 - Kostas E. Psannis

, Yutaka Ishibashi, Marios G. Hadjinicolaou:
Qos for wireless interactive multimedia streaming. 168-171 - Giorgos Karopoulos, Georgios Kambourakis

, Stefanos Gritzalis
:
Two privacy enhanced context transfer schemes. 172-175 - Ivan Martinovic, Frank A. Zdarsky, Jens B. Schmitt:

Regional-based authentication against dos attacks in wireless networks. 176-179 - Spyros Kopsidas, Dimitris Zisiadis

, Leandros Tassiulas:
A secure voip conference system: architecture analysis and design issues. 180-183

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














