p. 1-20
IC-CRP: An Interference-Constrained Routing Protocol for Multi-Hop Cognitive Radio Ad Hoc Networks
Baoming Sun, Wei Xie?, Lei Zhu, Ning Li and Jianfeng Zhang
Abstract
Full Text (IP)
p. 21-45
Heuristic Approach for Stagnation Free Energy Aware Routing in Wireless Sensor Networks
Sohail Jabbar, Abid Ali Minhas, Tahir Rashid and Seungmin Rho
Abstract
Full Text (IP)
p. 47-68
PAR-MAC: Reliable MAC Broadcast for Ad Hoc Networks with High Dynamicity
Zhaokun Qin, Weigang Wu, Yajuan Tang and Jiebin Zhang
Abstract
Full Text (IP)
p. 69-87
Spatial Reuse Superframe for High Throughput Cluster-Based WBAN with CSMA/CA
Pham Thanh Hiep
Abstract
Full Text (IP)
p. 89-99
A Hybrid EV Authentication Approach in Smart Grid Based Distributed Network
Sania Yaqoob and Taeshik Shon
Abstract
Full Text (IP)
p. 101-129
Adapting the Duty Cycle to Traffic Load in a Preamble Sampling MAC for WSNs: Formal Specification and Performance Evaluation
Marco Avvenuti, Cinzia Bernardeschi, Luca Cassano and Alessio Vecchio
Abstract
Full Text (IP)
p. 131-149
Practical Single Sign-on Mechanism for Distributed Computer Networks
Li Huang, Xinlai Tang, Hao Liu and Da Xiao
Abstract
Full Text (IP)
p. 151-172
A Scalable Authentication Protocol with Classified Protection in RFID-based Systems
Xueping Ren, Ming Jiang, Ting Wu, Xianghua Xu and Yinglong Ge
Abstract
Full Text (IP)
p. 199-226
AS2-MAC: An Energy-efficient MAC Protocol for Wireless Sensor Networks
Luca Anchora, Antonio Capone, Luca Mainetti, Vincenzo Mighali, Luigi Patrono and Francesco Simone
Abstract
Full Text (IP)
p. 227-258
Improved Lightweight Authentication Scheme for IEEE 802.11p Vehicle-to-Infrastructure Communication
Walid I. Khedr
Abstract
Full Text (IP)
p. 259-277
Latency Analysis for M2M and Online Gaming Traffic in an HSPA Network
Milica Popovic, Dejan Drajic, Philipp Svoboda, Navid Nikaein, Srdan Krco and Markus Laner
Abstract
Full Text (IP)
p. 279-302
A Novel Greedy Optimization Localization Algorithm for Wireless Sensor Networks in a Concave Area
Wen Yingyou, Li Zhi, Meng Yinghui and Zhang Tongjie
Abstract
Full Text (IP)
p. 303-337
Detecting Intruders by Wireless Sensor Networks
Mohammad J. Abdel-Rahman, Dima Abu-Aysheh, Ahmad I. Abu-El-Haija, Rasheed J. Abu-Aysheh and Hazem M. Al-Najjar
Abstract
Full Text (IP)