


default search action
International Journal of Mobile Computing and Multimedia Communications, Volume 3
Volume 3, Number 1, 2011
- Anjali Sardana, Ramesh C. Joshi:
Dual-Level Attack Detection, Characterization and Response for Networks Under DDoS Attacks. 1-20 - Hai Thanh Nguyen, Katrin Franke, Slobodan Petrovic:
Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. 21-34 - Holger Schmidt:
Threat and Risk-Driven Security Requirements Engineering. 35-50 - Sami J. Habib:
Analysis of Sensors' Coverage through Application-Specific WSN Provisioning Tool. 51-62 - Shuhaili Talib
, Nathan L. Clarke
, Steven Furnell
:
Establishing A Personalized Information Security Culture. 63-79
Volume 3, Number 2, 2011
- Anna Vapen, Nahid Shahmehri:
2-clickAuth: Optical Challenge-Response Authentication Using Mobile Handsets. 1-18 - Mehdia E. Ajana, Hamid Harroud, Mohammed Boulmalf, Mohammed Elkoutbi:
FlexRFID Middleware in the Supply Chain: Strategic Values and Challenges. 19-32 - Yehia Elrakaiby
, Frédéric Cuppens, Nora Cuppens-Boulahia:
An Integrated Approach for the Enforcement of Contextual Permissions and Pre-Obligations. 33-51 - Allam Mousa
:
Prioritization Schemes in Queuing Handoff and New Calls to Reduce Call Drops in Cellular Systems. 52-61 - Joel Penhoat, Karine Guillouard, Servane Bonjour, Pierrick Seite:
A Proposal for Enhancing the Mobility Management in the Future 3GPP Architectures. 62-81
Volume 3, Number 3, 2011
- Yaser M. Khamayseh
, Muneer O. Bani Yassein
, Iman I. Badran, Wail Mardini
:
An Adaptive Backoff Algorithm for Mobile Ad-Hoc Networks. 1-19 - Naveen Chauhan
, Lalit Kumar Awasthi
, Narottam Chand
, Ramesh Chandra Joshi, Manoj Misra:
Cooperative Caching in Mobile Ad Hoc Networks. 20-35 - Shailendra Mishra
, Durg Singh Chauhan:
Resource Allocation for Multi Access MIMO Systems. 36-50 - Shashi Bhushan
, Mayank Dave
, R. B. Patel:
Reducing Network Overhead with Common Junction Methodology. 51-61 - Surender Kumar Soni, Vivek Katiyar, Narottam Chand
:
An Energy-Efficient Multilevel Clustering Algorithm for Heterogeneous Wireless Sensor Networks. 62-79
Volume 3, Number 4, 2011
- Fatma-Zohra Chelali, Amar Djeradi:
Primary Research on Arabic Visemes, Analysis in Space and Frequency Domain. 1-19 - Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek:
On Cryptographically Strong Bindings of SAML Assertions to Transport Layer Security. 20-35 - Muazzan Binsaleh
, Shahizan Hassan
:
Systems Development Methodology for Mobile Commerce Applications. 36-52 - Prashant Kumar, Naveen Chauhan
, Lalit Kumar Awasthi
, Narottam Chand
:
Enhancing Data Availability in MANETs with Cooperative Caching. 53-66 - Teddy Mantoro
, Admir Milisic, Media A. Ayu
:
: Online Authentication Using Smart Card Technology in Mobile Phone Infrastructure. 67-83

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.