X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (147) 147
Journal Article (126) 126
Publication (55) 55
Patent (38) 38
Book Chapter (14) 14
Book / eBook (4) 4
Magazine Article (2) 2
Reference (2) 2
Book Review (1) 1
Newspaper Article (1) 1
Web Resource (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
security (53) 53
privacy (51) 51
telecommunications (44) 44
ad hoc networks (33) 33
computer science, information systems (33) 33
physics (33) 33
computer science (32) 32
electricity (32) 32
electric communication technique (31) 31
engineering, electrical & electronic (29) 29
calculating (27) 27
computing (27) 27
counting (27) 27
transmission of digital information, e.g. telegraphiccommunication (27) 27
networks (26) 26
protocols (26) 26
electric digital data processing (25) 25
location privacy (24) 24
wireless networks (24) 24
information and communication technology [ict] specially adaptedfor specific application fields (20) 20
computer networks (19) 19
computer science, hardware & architecture (18) 18
game theory (18) 18
studies (18) 18
genomics (17) 17
communication system security (15) 15
computer science - cryptography and security (15) 15
genomic privacy (15) 15
mobile computing (15) 15
networking and internet architecture (15) 15
cryptography (14) 14
routing (14) 14
wireless sensor networks (14) 14
computer communication networks (13) 13
computer security (13) 13
intelligent networks (13) 13
mathematical models (13) 13
mobile communication (13) 13
wireless communication (13) 13
[ info.info-ni ] computer science [cs]/networking and internet architecture [cs.ni] (12) 12
algorithms (12) 12
computer science, software engineering (12) 12
bioinformatics (11) 11
data privacy (11) 11
healthcare informatics, i.e. information and communicationtechnology [ict] specially adapted for the handling orprocessing of medical or healthcare data (11) 11
network security (11) 11
protection (11) 11
computer science, theory & methods (10) 10
cryptography and security (10) 10
internet (10) 10
ip networks (10) 10
mobile ad hoc networks (10) 10
analytical models (9) 9
computer science - networking and internet architecture (9) 9
data encryption (9) 9
encryption (9) 9
genes (9) 9
humans (9) 9
index medicus (9) 9
land mobile radio cellular systems (9) 9
mobile networks (9) 9
public key (9) 9
social networks (9) 9
[ info.info-cr ] computer science [cs]/cryptography and security [cs.cr] (8) 8
application software (8) 8
authentication (8) 8
computer applications (8) 8
computer information security (8) 8
data security (8) 8
inference (8) 8
management (8) 8
nash equilibrium (8) 8
relays (8) 8
robustness (8) 8
telecommunication traffic (8) 8
costs (7) 7
devices (7) 7
homomorphic encryption (7) 7
laboratories (7) 7
mobile communication systems (7) 7
network servers (7) 7
peer to peer computing (7) 7
research (7) 7
simulation (7) 7
spread spectrum communication (7) 7
testing (7) 7
usage (7) 7
wireless (7) 7
wireless communication systems (7) 7
[ info.info-mc ] computer science [cs]/mobile computing (6) 6
algorithm analysis and problem complexity (6) 6
analysis (6) 6
base stations (6) 6
blasting (6) 6
channels (6) 6
collaboration (6) 6
confidentiality (6) 6
design engineering (6) 6
ethics (6) 6
heating (6) 6
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Pervasive Computing, ISSN 1536-1268, 10/2006, Volume 5, Issue 4, pp. 57 - 58
Journal Article
2008, ISBN 9780521873710, Volume 9780521873710, xvii, 485
This is the first self-contained text to consider security and non-cooperative behavior in wireless networks. Major networking trends are analyzed and their... 
Security measures | Computer networks | Wireless communication systems | Wireless communication systems - Security measures
Book
Journal of Computer Security, ISSN 0926-227X, 2007, Volume 15, Issue 1, pp. 39 - 68
Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. In this paper, we... 
Wireless | Security | Vehicular ad hoc networks
Journal Article
IEEE Wireless Communications, ISSN 1536-1284, 10/2006, Volume 13, Issue 5, pp. 8 - 15
Journal Article
Proceedings of the 2012 ACM conference on computer and communications security, ISSN 1543-7221, 10/2012, pp. 617 - 627
The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order... 
stackelberg bayesian games | service quality | location privacy | privacy protection | optimal defense strategy | location inference attacks | location-based services | Location privacy | Stackelberg Bayesian games | Location-based services | Location inference attacks | Service quality
Conference Proceeding
IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, 02/2006, Volume 24, Issue 2, pp. 221 - 232
Journal Article
IEEE Communications Magazine, ISSN 0163-6804, 11/2008, Volume 46, Issue 11, pp. 100 - 109
Journal Article
Proceedings - IEEE INFOCOM, ISSN 0743-166X, 2008, pp. 1912 - 1920
Conference Proceeding
IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, 10/2007, Volume 25, Issue 8, pp. 1557 - 1568
Journal Article
Mobile Networks and Applications, ISSN 1383-469X, 10/2003, Volume 8, Issue 5, pp. 579 - 592
Journal Article
IEEE/ACM Transactions on Networking, ISSN 1063-6692, 08/2008, Volume 16, Issue 4, pp. 791 - 802
Journal Article
IEEE Wireless Communications, ISSN 1536-1284, 04/2006, Volume 13, Issue 2, pp. 50 - 55
Using wireless mesh networks to offer Internet connectivity is becoming a popular choice for wireless Internet service providers as it allows fast, easy, and... 
Wireless communication | Wireless mesh networks | Web and internet services | Authentication | Mobile communication | Public key cryptography | IP networks | Communication system security | Protection | Computer crime | Networks | Internet | Security | Communities
Journal Article
Journal Article
IEEE Communications Magazine, ISSN 0163-6804, 11/2008, Volume 46, Issue 11, pp. 110 - 118
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.