default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 102 matches
- 2012
- Johannes Braun, Johannes Buchmann:
Perfect Confidentiality Network: A Solution for Information Theoretically Secure Key Agreement. NTMS 2012: 1-5 - Mouna Abdelmoumen, Imen Arfaoui, Mounir Frikha, Tijani Chahed:
On the Performance of MANETs under Different Mobility Patterns and Routing Protocols and Its Improvement Based on Fixed Relay Nodes. NTMS 2012: 1-5 - Okoli Adaobi, Ejiro Igbesoko, Mona Ghassemian:
Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organised Networks. NTMS 2012: 1-5 - Tafzeel ur Rehman Ahsin, Slimane Ben Slimane:
Energy Efficient Resource Allocation and Deployment Strategies for Wireless Networks. NTMS 2012: 1-5 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Pseudorandom Number Generation in Smart Cards: An Implementation, Performance and Randomness Analysis. NTMS 2012: 1-7 - Syed Amjad Ali, Cüneyt Sevgi:
Energy Load Balancing for Fixed Clustering in Wireless Sensor Networks. NTMS 2012: 1-5 - Zibouda Aliouat, Makhlouf Aliouat:
Effective Energy Management in Routing Protocol for Wireless Sensor Networks. NTMS 2012: 1-5 - Tansu Alpcan:
Dynamic Incentives for Risk Management. NTMS 2012: 1-5 - Asma Amraoui, Fatima Zohra Benidriss, Badr Benmammar, Francine Krief, Fethi Tarik Bendimerad:
Toward Cognitive Radio Resource Management Based on Multi-Agent Systems for Improvement of Real-Time Application Performance. NTMS 2012: 1-4 - Anya Apavatjrut:
Energy Efficient Optimization and Route Recovery for Gradient Broadcast Routing Protocol for Wireless Sensor Networks. NTMS 2012: 1-4 - Nuray At, Jean-Luc Beuchat, Ismail San:
Compact Implementation of Threefish and Skein on FPGA. NTMS 2012: 1-5 - Zayneb Trabelsi Ayoub, Sofiane Ouni, Farouk Kamoun:
Global versus Local Re-Association Approach to Extend the Lifetime of Large-Scale IEEE 802.15.4/ZigBee Wireless Sensor Networks. NTMS 2012: 1-5 - Jiva N. Bagale, John P. T. Moore, Antonio D. Kheirkhahzadeh, Peter Komisarczuk:
Comparison of Messaging Protocols for Emerging Wireless Networks. NTMS 2012: 1-5 - Gianmarco Baldini, Valentin Rakovic, Vladimir Atanasovski, Liljana Gavrilovska:
Security Aspects of Policy Controlled Cognitive Radio. NTMS 2012: 1-5 - Kheira Dari Bekara, Maryline Laurent, Than Ha Nguyen:
Technical Enforcement of European Privacy Legislation: An Access Control Approach. NTMS 2012: 1-7 - Christophe Betoule, Thomas Bonald, Remi Clavier, Dario Rossi, Giuseppe Rossini, Gilles Thouénon:
Adaptive Probabilistic Flooding for Multipath Routing. NTMS 2012: 1-6 - Said El Brak, Mohammed Bouhorma, Anouar Abdelhakim Boudhir:
VoIP over VANETs (VoVAN): A QoS Measurements Analysis of Inter-Vehicular Voice Communication in Urban Scenario. NTMS 2012: 1-6 - Ramachandra Budihal, Hirisave S. Jamadagni:
Implementation and Benchmarking of CUSUM Algorithm for Spectrum Sensing under Low SNR Regimes on ANRC Cognitive Radio Testbed. NTMS 2012: 1-6 - Anthony Busson, Bijan Jabbari, Alireza Babaei, Véronique Vèque:
Throughput Limits in Spectrum Sensing Cognitive Radio Networks Using Point Processes. NTMS 2012: 1-8 - William G. Cassidy, Nabih Jaber, Kemal E. Tepe:
Cross Layer MAC and PHY Architecture for Collision Correction of DSRC Safety Messages. NTMS 2012: 1-5 - Anil Kumar Chorppath, Tansu Alpcan:
Risk Management for IT Security: When Theory Meets Practice. NTMS 2012: 1-5 - Ndeye Amy Dieng, Claude Chaudet, Maurice Charbit, Laurent Toutain, Tayeb Ben Meriem:
Experiments on the RSSI as a Range Estimator for Indoor Localization. NTMS 2012: 1-5 - Tassos Dimitriou, Antonis Michalas:
Multi-Party Trust Computation in Decentralized Environments. NTMS 2012: 1-5 - Zoya Dyka, Peter Langendörfer, Frank Vater, Steffen Peter:
Towards Strong Security in Embedded and Pervasive Systems: Energy and Area Optimized Serial Polynomial Multipliers in GF(2k). NTMS 2012: 1-6 - El-Sayed M. El-Alfy:
Automatic Identification Based on Hand Geometry and Probabilistic Neural Networks. NTMS 2012: 1-5 - Mohammad Reza Faghani, Ashraf Matrawy, Chung-Horng Lung:
A Study of Trojan Propagation in Online Social Networks. NTMS 2012: 1-5 - Nikos Fotiou, Giannis F. Marias, George C. Polyzos:
Fighting Phishing the Information-Centric Way. NTMS 2012: 1-5 - Sandra Frei, Woldemar F. Fuhrmann, Andreas Rinkel, Bogdan V. Ghita:
Prospects for WLAN in the Evolved Packet Core Environment. NTMS 2012: 1-5 - Kanwalinderjit Kaur Gagneja, Kendall E. Nygard:
Key Management Scheme for Routing in Clustered Heterogeneous Sensor Networks. NTMS 2012: 1-5 - Borislava Gajic, Jesús Palenzuela, Janne Riihijärvi, Petri Mähönen:
Mobility-Aware Topology Manager for Publish-Subscribe Networks. NTMS 2012: 1-5
skipping 72 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-01 02:14 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint