Search dblp for Publications

export results for "toc:db/journals/jowua/jowua1.bht:"

 download as .bib file

@article{DBLP:journals/jowua/0002CC10,
  author       = {Jie Zhang and
                  Chen Chen and
                  Robin Cohen},
  title        = {A Scalable and Effective Trust-Based Framework for Vehicular Ad-Hoc
                  Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {3--15},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.003},
  doi          = {10.22667/JOWUA.2010.12.31.003},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/0002CC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BernardosGCCS10,
  author       = {Carlos Jesus Bernardos and
                  Marco Gramaglia and
                  Luis M. Contreras and
                  Mar{\'{\i}}a Calder{\'{o}}n and
                  Ignacio Soto},
  title        = {Network-based Localized {IP} mobility Management: Proxy Mobile IPv6
                  and Current Trends in Standardization},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {16--35},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.016},
  doi          = {10.22667/JOWUA.2010.09.31.016},
  timestamp    = {Thu, 05 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BernardosGCCS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/BienPN10,
  author       = {Van Quang Bien and
                  R. Venkatesha Prasad and
                  Ignas G. Niemegeers},
  title        = {Handoff in Radio over Fiber Indoor Networks at 60 GHz},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {71--82},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.071},
  doi          = {10.22667/JOWUA.2010.09.31.071},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/BienPN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/CostaLMMISDM10,
  author       = {Gabriele Costa and
                  Aliaksandr Lazouski and
                  Fabio Martinelli and
                  Ilaria Matteucci and
                  Val{\'{e}}rie Issarny and
                  Rachid Saadi and
                  Nicola Dragoni and
                  Fabio Massacci},
  title        = {Security-by-Contract-with-Trust for Mobile Devices},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {75--91},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.075},
  doi          = {10.22667/JOWUA.2010.12.31.075},
  timestamp    = {Tue, 05 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/CostaLMMISDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/FuchsP10,
  author       = {Ludwig Fuchs and
                  G{\"{u}}nther Pernul},
  title        = {Reducing the Risk of Insider Misuse by Revising Identity Management
                  and User Account Data},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {14--28},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.014},
  doi          = {10.22667/JOWUA.2010.06.31.014},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/FuchsP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Gal-OzGG10,
  author       = {Nurit Gal{-}Oz and
                  Tal Grinshpoun and
                  Ehud Gudes},
  title        = {Privacy Issues with Sharing and Computing Reputation across Communities},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {16--34},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.016},
  doi          = {10.22667/JOWUA.2010.12.31.016},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Gal-OzGG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/HanKG10,
  author       = {Youn{-}Hee Han and
                  Chan{-}Myung Kim and
                  Joon{-}Min Gil},
  title        = {A Greedy Algorithm for Target Coverage Scheduling in Directional Sensor
                  Networks},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {96--106},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.096},
  doi          = {10.22667/JOWUA.2010.09.31.096},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/HanKG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/JaraZG10,
  author       = {Antonio J. Jara and
                  Miguel A. Zamora and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title        = {An Initial Approach to Support Mobility in Hospital Wireless Sensor
                  Networks based on 6LoWPAN {(HWSN6)}},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {107--122},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.107},
  doi          = {10.22667/JOWUA.2010.09.31.107},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/JaraZG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KafleI10,
  author       = {Ved P. Kafle and
                  Masugi Inoue},
  title        = {Locator {ID} Separation for Mobility Management in the New Generation
                  Network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {3--15},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.003},
  doi          = {10.22667/JOWUA.2010.09.31.003},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KafleI10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KimSNH10,
  author       = {Mucheol Kim and
                  Jiwan Seo and
                  Sanhyun Noh and
                  Sangyong Han},
  title        = {Reliable Social Trust Management with Mitigating Sparsity Problem},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {86--97},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.086},
  doi          = {10.22667/JOWUA.2010.06.31.086},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KimSNH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KiriyamaWXT10,
  author       = {Sawako Kiriyama and
                  Ryuji Wakikawa and
                  Jinwei Xia and
                  Fumio Teraoka},
  title        = {Context Reflector for Proxy Mobile IPv6},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {36--51},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.036},
  doi          = {10.22667/JOWUA.2010.09.31.036},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KiriyamaWXT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Kofod-PetersenC10,
  author       = {Anders Kofod{-}Petersen and
                  J{\"{o}}rg Cassens},
  title        = {Proxies for Privacy in Ambient Systems},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {62--74},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.062},
  doi          = {10.22667/JOWUA.2010.12.31.062},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Kofod-PetersenC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LeeT10,
  author       = {Jong{-}Hyouk Lee and
                  Fumio Teraoka},
  title        = {Guest Editorial: Advances in Wireless Mobile and Sensor Technologies},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {1--2},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.001},
  doi          = {10.22667/JOWUA.2010.09.31.001},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LeeT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LeeYCPYY10,
  author       = {Kyungroul Lee and
                  Hyeungjun Yeuk and
                  Youngtae Choi and
                  Sitha Pho and
                  Ilsun You and
                  Kangbin Yim},
  title        = {Safe Authentication Protocol for Secure {USB} Memories},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {46--55},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.046},
  doi          = {10.22667/JOWUA.2010.06.31.046},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LeeYCPYY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LiuCWW10,
  author       = {Debin Liu and
                  L. Jean Camp and
                  XiaoFeng Wang and
                  Lusha Wang},
  title        = {Using Budget-Based Access Control to Manage Operational Risks Caused
                  by Insiders},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {29--45},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.029},
  doi          = {10.22667/JOWUA.2010.06.31.029},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LiuCWW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/NagarajanJ10,
  author       = {Anand Nagarajan and
                  Christian Damsgaard Jensen},
  title        = {A Generic Role Based Access Control Model for Wind Power Systems},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {35--49},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.035},
  doi          = {10.22667/JOWUA.2010.12.31.035},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/NagarajanJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/SalemS10,
  author       = {Malek Ben Salem and
                  Salvatore J. Stolfo},
  title        = {Detecting Masqueraders: {A} Comparison of One-Class Bag-of-Words User
                  Behavior Modeling Techniques},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {3--13},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.003},
  doi          = {10.22667/JOWUA.2010.06.31.003},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/SalemS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/StanierNBLW10,
  author       = {James Stanier and
                  Stephen Naicken and
                  Anirban Basu and
                  Jian Li and
                  Ian Wakeman},
  title        = {Can We Use Trust in Online Dating?},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {50--61},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.050},
  doi          = {10.22667/JOWUA.2010.12.31.050},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/StanierNBLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Sun0SYS10,
  author       = {Jingbo Sun and
                  Yue Wang and
                  Hongbo Si and
                  Jian Yuan and
                  Xiuming Shan},
  title        = {Aggregate Human Mobility Modeling Using Principal Component Analysis},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {83--95},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.083},
  doi          = {10.22667/JOWUA.2010.09.31.083},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Sun0SYS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/ThiD10,
  author       = {Que Nguyet Tran Thi and
                  Tran Khanh Dang},
  title        = {Towards Side-Effects-free Database Penetration Testing},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {72--85},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.072},
  doi          = {10.22667/JOWUA.2010.06.31.072},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/ThiD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/TongCM10,
  author       = {Val{\'{e}}rie Viet Triem Tong and
                  Andrew J. Clark and
                  Ludovic M{\'{e}}},
  title        = {Specifying and Enforcing a Fine-Grained Information Flow Policy: Model
                  and Experiments},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {56--71},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.056},
  doi          = {10.22667/JOWUA.2010.06.31.056},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/TongCM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YanZY10,
  author       = {Zhiwei Yan and
                  Huachun Zhou and
                  Ilsun You},
  title        = {{N-NEMO:} {A} Comprehensive Network Mobility Solution in Proxy Mobile
                  IPv6 Network},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {2/3},
  pages        = {52--70},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.09.31.052},
  doi          = {10.22667/JOWUA.2010.09.31.052},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YanZY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/Yim10,
  author       = {Kangbin Yim},
  title        = {Guest Editorial: Advances in Trust Management},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {4},
  pages        = {1--2},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.12.31.001},
  doi          = {10.22667/JOWUA.2010.12.31.001},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/Yim10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/You10,
  author       = {Ilsun You},
  title        = {Editorial},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {1},
  number       = {1},
  pages        = {1--2},
  year         = {2010},
  url          = {https://doi.org/10.22667/JOWUA.2010.06.31.001},
  doi          = {10.22667/JOWUA.2010.06.31.001},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/You10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics