+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Volume 2, Issue 1/2, February 2012 (BibTex)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

pp. 1-21   
Towards secure mobile P2P applications using JXME
Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomartí, and Josep Prieto-Blázquez 

pp. 22-48
Interworking Techniques and Architectures for Heterogeneous Wireless Networks                                                          
Karl Andersson

pp. 49-58
A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data
Jianfeng Wang, Xiaofeng Chen, Hua Ma, Qiang Tang, Jin Li, and Hui Zhu

pp. 59-72
A Comparative Review of Connectivity-Based Wireless Sensor Localization Techniques 
Charles J. Zinsmeyer and Turgay Korkmaz

pp. 73-92
Implementing Workflow Reconfiguration in WS-BPEL 
Manuel Mazzara, Nicola Dragoni, and Mu Zhou

pp. 93-104
Private Two-Party Set Intersection Protocol in Rational Model          
Atsuko Miyaji and Mohammad Shahriar Rahman

pp. 105-118
A Context-aware Model to Support Ubiquitous Group Decision Making
João Carneiro, João Laranjeira, Goreti Marreiros, Carlos Freitas, and Ricardo Santos

pp. 119-131
A Survey and Taxonomy of Lightweight Intrusion Detection Systems
Sang Min Lee and Dong Seong Kim and Jong Sou Park


[Goto Archives] 
free templates