Found: 6
Select item for more details and to access through your institution.
A fully distributed replica allocation scheme for an opportunistic network.
- Published in:
- Wireless Networks (10220038), 2014, v. 20, n. 4, p. 733, doi. 10.1007/s11276-013-0641-6
- By:
- Publication type:
- Article
Mitigating jamming attacks in wireless broadcast systems.
- Published in:
- Wireless Networks (10220038), 2013, v. 19, n. 8, p. 1867, doi. 10.1007/s11276-013-0574-0
- By:
- Publication type:
- Article
Framework for Secure Wireless Communication in Wireless Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/585491
- By:
- Publication type:
- Article
Evaluation of Content-Matched Range Monitoring Queries over Moving Objects in Mobile Computing Environments.
- Published in:
- Sensors (14248220), 2015, v. 15, n. 9, p. 24143, doi. 10.3390/s150924143
- By:
- Publication type:
- Article
Low Power Synthesis and Validation of an Embedded Multiplier for FPGA Based Wireless Communication Systems.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 2, p. 365, doi. 10.1007/s11277-016-3897-1
- By:
- Publication type:
- Article
An RFID Search Protocol Secured Against Relay Attack Based on Distance Bounding Approach.
- Published in:
- Wireless Personal Communications, 2015, v. 85, n. 3, p. 711, doi. 10.1007/s11277-015-2804-5
- By:
- Publication type:
- Article