![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/adhoc/adhoc32.bht:"
@article{DBLP:journals/adhoc/AkgunC15, author = {Mete Akg{\"{u}}n and M. Ufuk {\c{C}}aglayan}, title = {Providing destructive privacy and scalability in {RFID} systems using PUFs}, journal = {Ad Hoc Networks}, volume = {32}, pages = {32--42}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2015.02.001}, doi = {10.1016/J.ADHOC.2015.02.001}, timestamp = {Mon, 05 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/AkgunC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/BoudiaSF15, author = {Omar Rafik Merad Boudia and Sidi Mohammed Senouci and Mohammed Feham}, title = {A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography}, journal = {Ad Hoc Networks}, volume = {32}, pages = {98--113}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2015.01.002}, doi = {10.1016/J.ADHOC.2015.01.002}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/BoudiaSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ChallalNSV15, author = {Yacine Challal and Enrico Natalizio and Sevil Sen and Anna Maria Vegni}, title = {Internet of Things security and privacy: Design methods and optimization}, journal = {Ad Hoc Networks}, volume = {32}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2015.05.010}, doi = {10.1016/J.ADHOC.2015.05.010}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/ChallalNSV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/FuentesPTP15, author = {Jos{\'{e}} Mar{\'{\i}}a de Fuentes and Pedro Peris{-}Lopez and Juan E. Tapiador and Sergio Pastrana}, title = {Probabilistic yoking proofs for large scale IoT systems}, journal = {Ad Hoc Networks}, volume = {32}, pages = {43--52}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2015.01.003}, doi = {10.1016/J.ADHOC.2015.01.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/FuentesPTP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/MostefaouiNF15, author = {Ahmed Mostefaoui and Hassan Noura and Zeinab Fawaz}, title = {An integrated multimedia data reduction and content confidentiality approach for limited networked devices}, journal = {Ad Hoc Networks}, volume = {32}, pages = {81--97}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2015.01.007}, doi = {10.1016/J.ADHOC.2015.01.007}, timestamp = {Thu, 09 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/MostefaouiNF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/NguyenLO15, author = {Kim Thuat Nguyen and Maryline Laurent and Nouha Oualha}, title = {Survey on secure communication protocols for the Internet of Things}, journal = {Ad Hoc Networks}, volume = {32}, pages = {17--31}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2015.01.006}, doi = {10.1016/J.ADHOC.2015.01.006}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/NguyenLO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/VucinicTRDDG15, author = {Malisa Vucinic and Bernard Tourancheau and Franck Rousseau and Andrzej Duda and Laurent Damon and Roberto Guizzetti}, title = {{OSCAR:} Object security architecture for the Internet of Things}, journal = {Ad Hoc Networks}, volume = {32}, pages = {3--16}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2014.12.005}, doi = {10.1016/J.ADHOC.2014.12.005}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/VucinicTRDDG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/WardY15, author = {Jon R. Ward and Mohamed F. Younis}, title = {Increasing base station anonymity using distributed beamforming}, journal = {Ad Hoc Networks}, volume = {32}, pages = {53--80}, year = {2015}, url = {https://doi.org/10.1016/j.adhoc.2015.01.001}, doi = {10.1016/J.ADHOC.2015.01.001}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/WardY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.