Works matching IS 18200214 AND DT 2013 AND VI 10 AND IP 2
Results: 20
A Hybrid Approach to Secure Hierarchical Mobile IPv6 Networks.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 913, doi. 10.2298/CSIS121114041G
- By:
- Publication type:
- Article
Efficient Implementation for QUAD Stream Cipher with GPUs.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 897, doi. 10.2298/CSIS121102040T
- By:
- Publication type:
- Article
Wiener-based ICI Cancellation Schemes for OFDM Systems over Fading Channels.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 877, doi. 10.2298/CSIS120722039W
- By:
- Publication type:
- Article
Benefiting From the Community Structure in Opportunistic Forwarding.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 865, doi. 10.2298/CSIS120921038B
- By:
- Publication type:
- Article
Key Management Approach for Secure Mobile Open IPTV Service.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 843, doi. 10.2298/CSIS120917037D
- By:
- Publication type:
- Article
Design and Implementation of an Efficient and Programmable Future Internet Testbed in Taiwan.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 825, doi. 10.2298/CSIS121114036H
- By:
- Publication type:
- Article
Content-based Image Retrieval using Spatial-color and Gabor Texture on a Mobile Device.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 807, doi. 10.2298/CSIS120716035L
- By:
- Publication type:
- Article
Cognitive RBAC in Mobile Heterogeneous Networks.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 779, doi. 10.2298/CSIS121110034C
- By:
- Publication type:
- Article
Activity Inference for Constructing User Intention Model.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 767, doi. 10.2298/CSIS121101033H
- By:
- Publication type:
- Article
A Real-time Location-based SNS Smartphone Application for the Disabled Population.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 747, doi. 10.2298/CSIS120711032J
- By:
- Publication type:
- Article
Topographic-Awareness and Situational-Perception Based Mobility Model with Artificial Bee Colony Algorithm for Tactical MANET.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 725, doi. 10.2298/CSIS120714031H
- By:
- Publication type:
- Article
Design and Implementation of E-Discovery as a Service based on Cloud Computing.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 703, doi. 10.2298/CSIS120922030L
- By:
- Publication type:
- Article
Traffic Deflection Method for DOS Attack Defense using a Location-Based Routing Protocol in the Sensor Network.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 685, doi. 10.2298/CSIS120914029K
- By:
- Publication type:
- Article
Efficient Verifiable Fuzzy Keyword Search over Encrypted Data in Cloud Computing.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 667, doi. 10.2298/CSIS121104028W
- By:
- Publication type:
- Article
An Efficient GTS Allocation Scheme for IEEE 802.15.4 MAC Layer.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 651, doi. 10.2298/CSIS120702027H
- By:
- Publication type:
- Article
Two-Step Hierarchical Scheme for Detecting Detoured Attacks to the Web Server.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 633, doi. 10.2298/CSIS120908026C
- By:
- Publication type:
- Article
Using Bivariate Polynomial to Design a Dynamic Key Management Scheme for Wireless Sensor Networks.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 589, doi. 10.2298/CSIS120907025C
- By:
- Publication type:
- Article
The Throughput Critical Condition Study for Reliable Multipath Transport.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 567, doi. 10.2298/CSIS120725024S
- By:
- Publication type:
- Article
Evaluation on the Influence of Internet Prefix Hijacking Events.
- Published in:
- Computer Science & Information Systems, 2013, v. 10, n. 2, p. 611, doi. 10.2298/CSIS121108023Z
- By:
- Publication type:
- Article
Support for End-to-End Response-Time and Delay Analysis in the Industrial Tool Suite: Issues, Experiences and a Case Study.
- Published in:
- 2013
- By:
- Publication type:
- Case Study