COMPUTER SCIENCE & ENGINEERING BIBLIOGRAPHY

Home

International Journal of UbiComp

ISSN : 0975 – 8992[Online]; 0976 - 2213[Print]

October 2011, Volume 2, Number 4 

Transparent Caching of Virtual Stubs for Improved Performance in Ubiquitous Environments  [Pdf
Lachhman Das Dhomeja1, Yasir Arfat Malkani1, Asad Ali Shaikh2 and Ayaz Keerio2, 1University of Sussex, UK and 2University of Sindh, Pakistan

Cryptanalysis of Sulma, An Ultralightweight Mutual Authentication Protocol for Low-Cost RFID Tags  [Pdf
Mahdi Azizi1 and Nasour Bagheri2, 1IHU University, Iran and 2Shahid Rajaee Teacher Training University, Iran

Security Flows and Improvement of a Recent Ultra Light-Weight RFID Protocol  [Pdf
Mehrdad Kianersi and Mahmoud Gardeshi, I.H.University, Iran

Cloud Based Application Development for Accessing Restaurant Information on Mobile Device using LBS  [Pdf
Keerthi S. Shetty and Sanjay Singh, Manipal University, India

Evaluation of Data Fusion in Radars Network and Determination of Optimum Algorithm  [Pdf
Ali Naseri and Omid Azmoon, Imam Hossein University, Iran

July 2011, Volume 2, Number 3 

Savings in Location Management Costs Leveraging User Statistics  [Pdf
E.Martin and R.Bajcsy, University of California,USA

A New System Architecture for Pervasive Computing  [Pdf
Anis ISMAIL1, Abd El Salam AL HAJJAR1 and Ziad Ismail2, 1Institut Universitaire de Technologie Université Libanaise, Liban and 2TELECOM ParisTech,France

System Support for Managing Invalid Bindings  [Pdf
Lachhman Das Dhomeja1, Yasir Arfat Malkani1, Azhar Ali Shah2 and Khalil Khoumbati2, 1University of Sussex,UK and 2University of Sindh,Pakistan

Efficient Algorithms to Enhance Recovery Schema in Link State Protocols  [Pdf
Radwan S.Abujassar and Mohammed Ghanbari, University of Essex,UK

Providing a Distance Bounding Protocol Named Pasargad in order to Defend against Relay Attacks on RFID-Based Electronic Voting System  [Pdf
Mohammad Arjmand1, Mahmoud Gardeshi1, Reza Taheri zohur2 and Mohammad Kazemi2, 1IHU University,Iran and 2Sharif University,Iran

April 2011, Volume 2, Number 2 

Efficient and Secure Authentication and Key Agreement Protocol     [Pdf
Ja’afer AL-Saraireh, Applied Science University, Jordan

SULMA: A Secure Ultra Light-Weight Mutual Authentication Protocol for Lowcost RFID Tags     [Pdf
Mehrdad Kianersi1, Mahmoud Gardeshi1 and Mohammad Arjmand2, 1IHU University, Tehran and 2Islamic Azad University, Iran

Data Storage on a RFID Tag for a Distributed System     [Pdf
Sarita Pais1and Judith Symonds2, 1Whitireia Community Polytechnic, Auckland and 2Auckland University of Technology, Auckland

SESSAMO: Session Mobility for Video Streaming Applications     [Pdf
Mohammed BOUTABIA1, Luis Rojas CARDENAS2 and Hossam AFIFI1, 1TELECOM SudParis, France and 2Universidad Autonoma Metropolitana, Mexico

 

January 2011, volume 2, number 1

Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard (Pdf)
MohammadHassan Habibi1, Mahmud Gardeshi1 and Mahdi R. Alaghband2, 1I.H University, Iran and 2Islamic Azad University, Iran

Information Selection and Delivery Algorithm for Delivering Advertisements Suitable for the Pedestrians Present at a Particular Site (Pdf)
Koichi Matsuoka, Nobuo Katou, Shigeo Dejima and Kazumasa Takami, Soka University, Japan

CDTOM: A Context-driven Task-oriented Middleware for Pervasive Homecare Environment (Pdf)
Hongbo Ni1,2, Bessam Abdulrazak2, Daqing Zhang3 and Shu Wu2, 1Northwestern Polytechnic University, China, 2University of Sherbrooke, Canada and 3Institut Telecom SudParis, France

 

 

 

Copyright 2010 AIRCC. All rights reserved.

Maintained by NnN