+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Volume 2, Issue 1/2, February 2012 (BibTex)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-
Towards secure mobile P2P applications using JXME
Marc Domingo-Prieto, Joan Arnedo-Moreno, Jordi Herrera-Joancomarti, and Josep Prieto-Blazquez 

Interworking Techniques and Architectures for Heterogeneous Wireless Networks                                                          
Karl Andersson

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data
Jianfeng Wang, Xiaofeng Chen, Hua Ma, Qiang Tang, Jin Li, and Hui Zhu

A Comparative Review of Connectivity-Based Wireless Sensor Localization Techniques 
Charles J. Zinsmeyer and Turgay Korkmaz

Implementing Workflow Reconfiguration in WS-BPEL 
Manuel Mazzara, Nicola Dragoni, and Mu Zhou

Private Two-Party Set Intersection Protocol in Rational Model          
Atsuko Miyaji and Mohammad Shahriar Rahman

A Context-aware Model to Support Ubiquitous Group Decision Making
Joao Carneiro, Joao Laranjeira, Goreti Marreiros, Carlos Freitas, and Ricardo Santos

A Survey and Taxonomy of Lightweight Intrusion Detection Systems
Sang Min Lee and Dong Seong Kim and Jong Sou Park


[Goto Archives]