Search dblp for Publications

export results for "toc:db/journals/adhoc/adhoc32.bht:"

 download as .bib file

@article{DBLP:journals/adhoc/AkgunC15,
  author       = {Mete Akg{\"{u}}n and
                  M. Ufuk {\c{C}}aglayan},
  title        = {Providing destructive privacy and scalability in {RFID} systems using
                  PUFs},
  journal      = {Ad Hoc Networks},
  volume       = {32},
  pages        = {32--42},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2015.02.001},
  doi          = {10.1016/J.ADHOC.2015.02.001},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/AkgunC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/BoudiaSF15,
  author       = {Omar Rafik Merad Boudia and
                  Sidi Mohammed Senouci and
                  Mohammed Feham},
  title        = {A novel secure aggregation scheme for wireless sensor networks using
                  stateful public key cryptography},
  journal      = {Ad Hoc Networks},
  volume       = {32},
  pages        = {98--113},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2015.01.002},
  doi          = {10.1016/J.ADHOC.2015.01.002},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/BoudiaSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ChallalNSV15,
  author       = {Yacine Challal and
                  Enrico Natalizio and
                  Sevil Sen and
                  Anna Maria Vegni},
  title        = {Internet of Things security and privacy: Design methods and optimization},
  journal      = {Ad Hoc Networks},
  volume       = {32},
  pages        = {1--2},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2015.05.010},
  doi          = {10.1016/J.ADHOC.2015.05.010},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/ChallalNSV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/FuentesPTP15,
  author       = {Jos{\'{e}} Mar{\'{\i}}a de Fuentes and
                  Pedro Peris{-}Lopez and
                  Juan E. Tapiador and
                  Sergio Pastrana},
  title        = {Probabilistic yoking proofs for large scale IoT systems},
  journal      = {Ad Hoc Networks},
  volume       = {32},
  pages        = {43--52},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2015.01.003},
  doi          = {10.1016/J.ADHOC.2015.01.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/FuentesPTP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/MostefaouiNF15,
  author       = {Ahmed Mostefaoui and
                  Hassan Noura and
                  Zeinab Fawaz},
  title        = {An integrated multimedia data reduction and content confidentiality
                  approach for limited networked devices},
  journal      = {Ad Hoc Networks},
  volume       = {32},
  pages        = {81--97},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2015.01.007},
  doi          = {10.1016/J.ADHOC.2015.01.007},
  timestamp    = {Thu, 09 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/MostefaouiNF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/NguyenLO15,
  author       = {Kim Thuat Nguyen and
                  Maryline Laurent and
                  Nouha Oualha},
  title        = {Survey on secure communication protocols for the Internet of Things},
  journal      = {Ad Hoc Networks},
  volume       = {32},
  pages        = {17--31},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2015.01.006},
  doi          = {10.1016/J.ADHOC.2015.01.006},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/NguyenLO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/VucinicTRDDG15,
  author       = {Malisa Vucinic and
                  Bernard Tourancheau and
                  Franck Rousseau and
                  Andrzej Duda and
                  Laurent Damon and
                  Roberto Guizzetti},
  title        = {{OSCAR:} Object security architecture for the Internet of Things},
  journal      = {Ad Hoc Networks},
  volume       = {32},
  pages        = {3--16},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2014.12.005},
  doi          = {10.1016/J.ADHOC.2014.12.005},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/VucinicTRDDG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/WardY15,
  author       = {Jon R. Ward and
                  Mohamed F. Younis},
  title        = {Increasing base station anonymity using distributed beamforming},
  journal      = {Ad Hoc Networks},
  volume       = {32},
  pages        = {53--80},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.adhoc.2015.01.001},
  doi          = {10.1016/J.ADHOC.2015.01.001},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/adhoc/WardY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics