Search Results

There are 22406 results for: content related to: Performance analysis of secure beaconing messages for GeoNetworking

  1. A novel D–S based secure localization algorithm for wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 11, November 2014, Pages: 1945–1954, Ning Yu, Lirui Zhang and Yongji Ren

    Version of Record online : 8 NOV 2013, DOI: 10.1002/sec.909

  2. Certificateless broadcast authentication for vehicular ad hoc networks

    Security and Communication Networks

    Volume 6, Issue 5, May 2013, Pages: 602–611, Eun-Kyung Ryu and Kee-Young Yoo

    Version of Record online : 27 JUN 2012, DOI: 10.1002/sec.590

  3. A jamming-attack-defending data forwarding scheme based on channel surfing in wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 11, November 2013, Pages: 1367–1388, Amrita Ghosal and Sipra Das Bit

    Version of Record online : 3 APR 2013, DOI: 10.1002/sec.719

  4. Vehicle to Internet communications using the ETSI ITS GeoNetworking protocol

    Transactions on Emerging Telecommunications Technologies

    Volume 27, Issue 3, March 2016, Pages: 373–391, Victor Sandonis, Ignacio Soto, Maria Calderon and Manuel Urueña

    Version of Record online : 23 OCT 2014, DOI: 10.1002/ett.2895

  5. On the quality of broadcast services in vehicular ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 3, March 2011, Pages: 329–346, Dario Rossi, Roberta Fracchia and Michela Meo

    Version of Record online : 28 AUG 2010, DOI: 10.1002/sec.211

  6. RAMV: ensuring resource-aware message verification in VANETs

    Security and Communication Networks

    Volume 4, Issue 7, July 2011, Pages: 771–784, Zhengming Li and Chunxiao Chigan

    Version of Record online : 8 FEB 2011, DOI: 10.1002/sec.266

  7. Comparative study of trust and reputation systems for wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 669–688, Osman Khalid, Samee U. Khan, Sajjad A. Madani, Khizar Hayat, Majid I. Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally and Dan Chen

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.597

  8. A survey of key distribution in wireless sensor networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2495–2508, Chi-Yuan Chen and Han-Chieh Chao

    Version of Record online : 13 JUL 2011, DOI: 10.1002/sec.354

  9. Autonomous and adaptive beaconing strategy for multi-interfaced wireless mobile nodes

    Wireless Communications and Mobile Computing

    Rafaa Tahar, Amine Dhraief, Abdelfettah Belghith, Hassan Mathkour and Rafik Braham

    Version of Record online : 1 OCT 2015, DOI: 10.1002/wcm.2638

  10. A secure and privacy-preserving event reporting scheme for vehicular Ad Hoc networks

    Security and Communication Networks

    Volume 8, Issue 17, 25 November 2015, Pages: 3271–3281, Khaled Rabieh, Mohamed M. E. A. Mahmoud, Marianne Azer and Mahmoud Allam

    Version of Record online : 8 APR 2015, DOI: 10.1002/sec.1251

  11. A localization strategy based on n-times trilateral centroid with weight

    International Journal of Communication Systems

    Volume 25, Issue 9, September 2012, Pages: 1160–1177, Tie Qiu, Yu Zhou, Feng Xia, Naigao Jin and Lin Feng

    Version of Record online : 1 MAR 2012, DOI: 10.1002/dac.2332

  12. RIALS: RSU/INS-aided localization system for GPS-challenged road segments

    Wireless Communications and Mobile Computing

    Himan Zarza, Saleh Yousefi and Abderrahim Benslimane

    Version of Record online : 28 JUN 2015, DOI: 10.1002/wcm.2604

  13. Privacy protection for vehicular ad hoc networks by using an efficient revocable message authentication scheme

    Security and Communication Networks

    Volume 5, Issue 5, May 2012, Pages: 462–478, Chun-I Fan, Ruei-Hau Hsu and Wei-Kuei Chen

    Version of Record online : 18 MAY 2011, DOI: 10.1002/sec.328

  14. Entrepreneurial beacons: The Yale endowment, run-ups, and the growth of venture capital

    Strategic Management Journal

    Y. Sekou Bermiss, Benjamin L. Hallen, Rory McDonald and Emily C. Pahnke

    Version of Record online : 31 MAR 2016, DOI: 10.1002/smj.2508

  15. Smart Magnetic Fluorescent Nanoparticle Imaging Probes to Monitor MicroRNAs

    Small

    Volume 6, Issue 1, January 4, 2010, Pages: 81–88, Do Won Hwang, In Chan Song, Dong Soo Lee and Soonhag Kim

    Version of Record online : 12 NOV 2009, DOI: 10.1002/smll.200901262

  16. Toward attack-resistant localization under infrastructure attacks

    Security and Communication Networks

    Volume 5, Issue 4, April 2012, Pages: 384–403, Jie Yang and Yingying Chen

    Version of Record online : 12 MAY 2011, DOI: 10.1002/sec.323

  17. Nanostructured Probes for In Vivo Gene Detection

    Standard Article

    Nanotechnology

    Gang Bao, Phillip Santangelo, Nitin Nitin and Won Jong Rhee

    Published Online : 15 MAR 2010, DOI: 10.1002/9783527628155.nanotech054

  18. Hierarchical routing over dynamic wireless networks

    Random Structures & Algorithms

    Volume 47, Issue 4, December 2015, Pages: 669–709, Dominique Tschopp, Suhas Diggavi and Matthias Grossglauser

    Version of Record online : 15 SEP 2015, DOI: 10.1002/rsa.20589

  19. Performance evaluation of IEEE 802.15.4 sensor networks in industrial applications

    International Journal of Communication Systems

    Volume 28, Issue 10, 10 July 2015, Pages: 1657–1674, Wan Du, David Navarro and Fabien Mieyeville

    Version of Record online : 19 FEB 2014, DOI: 10.1002/dac.2756

  20. Information geometric security analysis of differential phase-shift quantum key distribution protocol

    Security and Communication Networks

    Volume 6, Issue 2, February 2013, Pages: 129–150, Laszlo Gyongyosi and Sandor Imre

    Version of Record online : 19 JUN 2012, DOI: 10.1002/sec.542