books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 31; Issue 18
Main
Computer Communications
Volume 31; Issue 18
Computer Communications
Volume 31; Issue 18
1
A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks
Bo-Chao Cheng
,
Huan Chen
,
Yi-Jean Li
,
Ryh-Yuh Tseng
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 230 KB
Your tags:
english, 2008
2
iMuseum: A scalable context-aware intelligent museum system
Zhiyong Yu
,
Xingshe Zhou
,
Zhiwen Yu
,
Jong Hyuk Park
,
Jianhua Ma
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 339 KB
Your tags:
english, 2008
3
A study on secure RFID mutual authentication scheme in pervasive computing environment
Soo-Young Kang
,
Deok-Gyu Lee
,
Im-Yeong Lee
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 458 KB
Your tags:
english, 2008
4
A compensation scheme of fingerprint distortion using combined radial basis function model for ubiquitous services
Xuefeng Liang
,
Naixue Xiong
,
Laurence T. Yang
,
Hui Zhang
,
Jong Hyuk Park
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 359 KB
Your tags:
english, 2008
5
An efficient end-to-end security mechanism for IP multimedia subsystem
Chi-Yuan Chen
,
Tin-Yu Wu
,
Yueh-Min Huang
,
Han-Chieh Chao
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 948 KB
Your tags:
english, 2008
6
A unified security framework with three key management schemes for wireless sensor networks
Rabia Riaz
,
Ayesha Naureen
,
Attiya Akram
,
Ali Hammad Akbar
,
Ki-Hyung Kim
,
H. Farooq Ahmed
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 346 KB
Your tags:
english, 2008
7
Self-optimization of secure web services
Valentina Casola
,
Emilio P. Mancini
,
Nicola Mazzocca
,
Massimiliano Rak
,
Umberto Villano
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 1.19 MB
Your tags:
english, 2008
8
Handling uncertainty in multimodal pervasive computing applications
Marie-Luce Bourguet
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 664 KB
Your tags:
english, 2008
9
Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments
Chun-Ta Li
,
Min-Shiang Hwang
,
Yen-Ping Chu
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 171 KB
Your tags:
english, 2008
10
Middleware mechanisms for supporting multimodal interactions in smart environments
Antonio Coronato
,
Giuseppe De Pietro
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 677 KB
Your tags:
english, 2008
11
A trust-based secure service discovery (TSSD) model for pervasive computing
Sheikh I. Ahamed
,
Moushumi Sharmin
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 509 KB
Your tags:
english, 2008
12
Secure multi-mode systems and their applications for pervasive computing
Jong Hyuk Park
,
Hsiao-Hwa Chen
,
Antonio Coronato
,
Gerd Kortuem
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 105 KB
Your tags:
english, 2008
13
Publisher’s Note: New Editor-in-Chief
Journal:
Computer Communications
Year:
2008
File:
PDF, 91 KB
Your tags:
2008
14
Editorial Board
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 46 KB
Your tags:
english, 2008
15
Subject Index
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 284 KB
Your tags:
english, 2008
16
Author Index
Journal:
Computer Communications
Year:
2008
File:
PDF, 117 KB
Your tags:
2008
17
A trust-based security system for ubiquitous and pervasive computing environments
Azzedine Boukerche
,
Yonglin Ren
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 253 KB
Your tags:
english, 2008
18
Security co-existence of wireless sensor networks and RFID for pervasive computing
Bo Sun
,
Yang Xiao
,
Chung Chih Li
,
Hsiao-Hwa Chen
,
T. Andrew Yang
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 287 KB
Your tags:
english, 2008
19
A secure network management protocol for SmartGrid BPL networks: Design, implementation and experimental results
M.P. Anastasopoulos
,
A.C. Voulkidis
,
Athanasios V. Vasilakos
,
P.G. Cottis
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 1.52 MB
Your tags:
english, 2008
20
Group-based intrusion detection system in wireless sensor networks
Guorui Li
,
Jingsha He
,
Yingfang Fu
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 1.30 MB
Your tags:
english, 2008
21
Location management scheme with WLAN positioning algorithm for integrated wireless networks
Chih-Hsiung Tseng
,
Sheng-Tzong Cheng
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 432 KB
Your tags:
english, 2008
22
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
Ming Lei
,
Yang Xiao
,
Susan V. Vrbsky
,
Chung-Chih Li
Journal:
Computer Communications
Year:
2008
Language:
english
File:
PDF, 470 KB
Your tags:
english, 2008
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×