Found: 10
Select item for more details and to access through your institution.
Special issue on “quality of service and security in wireless and mobile networks”.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 5, p. 593, doi. 10.1002/wcm.883
- By:
- Publication type:
- Article
Scheduling channel time allocations in 802.15.3 WPANs for supporting multimedia applications.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 5, p. 596, doi. 10.1002/wcm.730
- By:
- Publication type:
- Article
Simulation study of IEEE 802.15.4 LR-WPAN for industrial applications.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 5, p. 609, doi. 10.1002/wcm.736
- By:
- Publication type:
- Article
Securing multi-operator-based QoS-aware mesh networks: requirements and design options.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 5, p. 622, doi. 10.1002/wcm.728
- By:
- Publication type:
- Article
Path quality detection algorithms for near optimal geographic routing in sensor networks with obstacles.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 5, p. 647, doi. 10.1002/wcm.727
- By:
- Publication type:
- Article
Secure timing synchronization for heterogeneous sensor network using pairing over elliptic curve.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 5, p. 662, doi. 10.1002/wcm.735
- By:
- Publication type:
- Article
ARMA: a scalable secure routing protocol with privacy protection for mobile ad hoc networks.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 5, p. 672, doi. 10.1002/wcm.737
- By:
- Publication type:
- Article
Enhanced access control in hybrid MANETs through utility-based pre-authentication control.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 5, p. 688, doi. 10.1002/wcm.729
- By:
- Publication type:
- Article
MULEPRO: a multi-channel response to jamming attacks in wireless sensor networks.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 5, p. 704, doi. 10.1002/wcm.734
- By:
- Publication type:
- Article
Quality of security through triple key scheme in wireless sensor networks.
- Published in:
- Wireless Communications & Mobile Computing, 2010, v. 10, n. 5, p. 722, doi. 10.1002/wcm.733
- By:
- Publication type:
- Article