-
1
-
-
33846182927
-
An integrated impact assessment and weighting methodology: Evaluation of the environmental consequences of computer display technology substitution
-
Article (CrossRef Link)
-
X.Y. Zhou and J.M. Schoenung, "An integrated impact assessment and weighting methodology: Evaluation of the environmental consequences of computer display technology substitution, " in Proc. of Journal of Environmental Management, vol. 83, no. 1, pp. 1-24, 2007. Article (CrossRef Link)
-
(2007)
Proc. of Journal of Environmental Management
, vol.83
, Issue.1
, pp. 1-24
-
-
Zhou, X.Y.1
Schoenung, J.M.2
-
2
-
-
66749108916
-
Survey and analysis of multimodal sensor planning and integration for wide area surveillance
-
Article (CrossRef Link)
-
Abidi. B. R, Aragam. N. R, Yao. Y and Abidi. MA, "Survey and analysis of multimodal sensor planning and integration for wide area surveillance, " in Proc. of ACM Computer Surveys, vol. 41, no. 1, 2008. Article (CrossRef Link)
-
(2008)
Proc. of ACM Computer Surveys
, vol.41
, Issue.1
-
-
Abidi, B.R.1
Aragam, N.R.2
Yao, Y.3
Abidi, M.A.4
-
3
-
-
79251600299
-
A survey on cross-layer solutions for wireless sensor networks
-
Article (CrossRef Link)
-
Mendes. LDP and Rodrigues. JJPC, "A survey on cross-layer solutions for wireless sensor networks, " in Proc. of Journal of network and computer applications, vol. 34, no. 2, pp. 523-534, 2011. Article (CrossRef Link)
-
(2011)
Proc. of Journal of network and computer applications
, vol.34
, Issue.2
, pp. 523-534
-
-
Mendes, L.D.P.1
Rodrigues, J.J.P.C.2
-
4
-
-
84863059752
-
Machine-to-machine kommunikition
-
Axel. Glanz and Oliver. Jung, "Machine-to-machine kommunikition, " in Proc. of Campus Verlag, pp. 7-14, 2010.
-
(2010)
Proc. of Campus Verlag
, pp. 7-14
-
-
Axel, G.1
Oliver, J.2
-
5
-
-
70249090090
-
Trust in M2M communication
-
Article (CrossRef Link)
-
Cha. Inhyok, Shah. Yogendra and Schmidt. Andreas U, "Trust in M2M communication, " in Proc. of IEEE Vehicular Technology Magazine, vol. 4, no. 3 pp. 69-75, 2009. Article (CrossRef Link)
-
(2009)
Proc. of IEEE Vehicular Technology Magazine
, vol.4
, Issue.3
, pp. 69-75
-
-
Cha, I.1
Shah, Y.2
Schmidt, A.U.3
-
6
-
-
79952981834
-
Global wireless machine-to-machine standardization
-
Article (CrossRef Link)
-
Chang. Kim, Soong. Anthony and Tseng. Mitch, "Global wireless machine-to-machine standardization, " in Proc. of IEEE Internet Computing, vol. 15, no. 2, pp. 64-69, 2011. Article (CrossRef Link)
-
(2011)
Proc. of IEEE Internet Computing
, vol.15
, Issue.2
, pp. 64-69
-
-
Chang, K.1
Soong, A.2
Tseng, M.3
-
8
-
-
84863051571
-
SEMOPS: Paying with mobile personal devices
-
Article (CrossRef Link)
-
Ramfos. A, Karnouskos. S and Vilmos. A, "SEMOPS: Paying with mobile personal devices, " in Proc. of International Federation for Information Processing, vol. 146, pp. 247-261, 2004. Article (CrossRef Link)
-
(2004)
Proc. of International Federation for Information Processing
, vol.146
, pp. 247-261
-
-
Ramfos, A.1
Karnouskos, S.2
Vilmos, A.3
-
9
-
-
44149083053
-
The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application
-
Article (CrossRef Link)
-
Au. Yoris. A and Kauffman. Robert. J, "The economics of mobile payments: Understanding stakeholder issues for an emerging financial technology application, " in Proc. of Electronic Commerce Research and Applications, vol. 7, no. 2, pp. 141-164, 2008. Article (CrossRef Link)
-
(2008)
Proc. of Electronic Commerce Research and Applications
, vol.7
, Issue.2
, pp. 141-164
-
-
Yoris, A.A.1
Kauffman, R.J.2
-
10
-
-
84863032878
-
Security, trust and privacy in the secure mobile payment service
-
Stamatis. Karnouskos, Anna. Hondroudaki, András. Vilmos and Balázs. Csik, "Security, trust and privacy in the secure mobile payment service, " in Proc. of 3rd International Conference on Mobile Business, 2004.
-
(2004)
Proc. of 3rd International Conference on Mobile Business
-
-
Stamatis, K.1
Anna, H.2
András, V.3
Balázs, C.4
-
11
-
-
79956062825
-
Authentications and key management in 3G-WLAN interworking
-
Article (CrossRef Link)
-
Li. Xinghua, Lu. Xiang and Ma. Jianfeng, "Authentications and key management in 3G-WLAN interworking, " in Proc. of Mobile Network & Applications, vol. 16, no. 3, pp. 394-407, 2011. Article (CrossRef Link)
-
(2011)
Proc. of Mobile Network & Applications
, vol.16
, Issue.3
, pp. 394-407
-
-
Li, X.1
Lu, X.2
Ma, J.3
-
13
-
-
78650083273
-
Payment applications make e-commerce mobile
-
Article (CrossRef Link)
-
Leavitt. Neal, "Payment applications make e-commerce mobile, " in Proc. IEEE of Computer, vol. 43, no. 12, pp. 19-22, 2010. Article (CrossRef Link)
-
(2010)
Proc. IEEE of Computer
, vol.43
, Issue.12
, pp. 19-22
-
-
Leavitt, N.1
-
14
-
-
78651097547
-
Research on mobile payment technology and business models in China under e-commerce environment
-
Article (CrossRef Link)
-
Gu. Ruijun, Yao. Juan and Wang. Jiacai, "Research on mobile payment technology and business models in China under e-commerce environment, " in Proc. of Future Generation Information Technology, vol. 6485, pp. 334-343, 2010. Article (CrossRef Link)
-
(2010)
Proc. of Future Generation Information Technology
, vol.6485
, pp. 334-343
-
-
Gu, R.1
Yao, J.2
Wang, J.3
-
15
-
-
77950396943
-
The applications of mobile payment
-
Article (CrossRef Link)
-
Chen. Xin, "The applications of mobile payment, " in Proc. of High Performance Networking, Computing, Communication Systems and Mathematical Foundations, vol. 66, pp. 62-67, 2010. Article (CrossRef Link)
-
(2010)
Proc. of High Performance Networking, Computing, Communication Systems and Mathematical Foundations
, vol.66
, pp. 62-67
-
-
Chen, X.1
-
17
-
-
77956636535
-
Modeling the interaction of users and mobile payment system: Conceptual framework
-
Article (CrossRef Link)
-
Shin. Dong-Hee, "Modeling the interaction of users and mobile payment system: Conceptual framework, " in Proc. of International Journal of Human-Computer Interaction, vol. 26, no. 10, pp. 917-940, 2010. Article (CrossRef Link)
-
(2010)
Proc. of International Journal of Human-Computer Interaction
, vol.26
, Issue.10
, pp. 917-940
-
-
Shin, D.-H.1
-
19
-
-
71249154897
-
E-Banking: Issues and challenges
-
Article (CrossRef Link)
-
Nami. Mohammad. Reza, "E-Banking: Issues and challenges, " in Proc. of 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel Distributed, pp. 263-266, 2009Article (CrossRef Link)
-
(2009)
Proc. of 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel Distributed
, pp. 263-266
-
-
Nami, M.R.1
-
20
-
-
85013602517
-
Employ a mobile agent for making a payment
-
Article (CrossRef Link)
-
Wang. Yan, Wong. Duncan. S and Wang. Huaxiong, "Employ a mobile agent for making a payment, " in Proc. of Journal Mobile Information Systems, vol. 4, no. 1, pp. 51-68, 2008. Article (CrossRef Link)
-
(2008)
Proc. of Journal Mobile Information Systems
, vol.4
, Issue.1
, pp. 51-68
-
-
Wang, Y.1
Wong, D.S.2
Wang, H.3
-
21
-
-
44149090512
-
Past, present and future of mobile payments research: A literature review
-
Article (CrossRef Link)
-
Tomi. Dahlberg, Niina. Mallat, Jan. Ondrus and Agnieszka. Zmijewska, "Past, present and future of mobile payments research: A literature review, " in Proc. of Electronic Commerce Research and Applications, vol. 7, no. 2, pp. 165-181, 2008. Article (CrossRef Link)
-
(2008)
Proc. of Electronic Commerce Research and Applications
, vol.7
, Issue.2
, pp. 165-181
-
-
Tomi, D.1
Niina, M.2
Jan, O.3
Agnieszka, Z.4
-
29
-
-
77952201223
-
A lightweight and secure protocol for mobile payments via wireless internet in m-commerce
-
Tabandehjooy. Ali Akbar and Nazhand. Navid, "A lightweight and secure protocol for mobile payments via wireless internet in m-commerce, " in Proc. of 2010 International Conference on E-education, E-business, E-management and E-learning: IC4E 2010, pp. 495-498, 2010
-
(2010)
Proc. of 2010 International Conference on E-education, E-business, E-management and E-learning: IC4E 2010
, pp. 495-498
-
-
Tabandehjooy, A.A.1
Nazhand, N.2
-
30
-
-
58049135005
-
SecureSMSPay: Secure SMS mobile payment model
-
Article (CrossRef Link)
-
Harb. Hany, Farahat. Hassan and Ezz. Mohamed, "SecureSMSPay: Secure SMS mobile payment model, " in Proc. of 2nd International Conference on Anti-counterfeiting, Security and Identification, pp. 11-17, 2008 Article (CrossRef Link)
-
(2008)
Proc. of 2nd International Conference on Anti-counterfeiting, Security and Identification
, pp. 11-17
-
-
Harb, H.1
Farahat, H.2
Ezz, M.3
-
32
-
-
79960062320
-
An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks
-
Article (CrossRef Link)
-
Fan. Rong, He. Dao-jing and Pan. Xue-zeng, "An efficient and DoS-resistant user authentication scheme for two-tiered wireless sensor networks, " in Proc. of Journal of Zhejiang University-science C-computers & Electronics, vol. 12, no. 7, pp. 550-560, 2011. Article (CrossRef Link)
-
(2011)
Proc. of Journal of Zhejiang University-science C-computers & Electronics
, vol.12
, Issue.7
, pp. 550-560
-
-
Fan, R.1
He, D.-J.2
Pan, X.-Z.3
-
33
-
-
20344392154
-
Benchmarking block ciphers for wireless sensor networks
-
Article (CrossRef Link)
-
Y. W. Law, J. Doumen, and P. Hartel, "Benchmarking block ciphers for wireless sensor networks, " in Proc. of IEEE International Conference Mobile Ad-hoc Sensor Systems, 2004, pp. 447-456. Article (CrossRef Link)
-
(2004)
Proc. of IEEE International Conference Mobile Ad-hoc Sensor Systems
, pp. 447-456
-
-
Law, Y.W.1
Doumen, J.2
Hartel, P.3
-
34
-
-
20344381294
-
A public-key infrastructure for key distribution in tinyOS based on elliptic curve cryptography
-
Article (CrossRef Link)
-
D. J. Malan, M. Welsh, and M. D. Smith, "A public-key infrastructure for key distribution in tinyOS based on elliptic curve cryptography, " in Proc. of 1st IEEE International Conf. Sensor Ad Hoc Communucatuib Networks, pp. 71-80, 2004. Article (CrossRef Link)
-
(2004)
Proc. of 1st IEEE International Conf. Sensor Ad Hoc Communucatuib Networks
, pp. 71-80
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
36
-
-
1542317846
-
An authentication framework for hierarchical ad hoc sensor networks
-
Article (CrossRef Link)
-
M. Bohge and W. Trappe, "An authentication framework for hierarchical ad hoc sensor networks, " in Proc. of ACM Workshop Wireless Security, pp. 79-87, 2003. Article (CrossRef Link)
-
(2003)
Proc. of ACM Workshop Wireless Security
, pp. 79-87
-
-
Bohge, M.1
Trappe, W.2
-
37
-
-
33745963889
-
A security architecture for mobile wireless sensor networks
-
S. Schmidt, H. Krahn, S. Fischer, and D. Watjen, "A security architecture for mobile wireless sensor networks, " in Proc. of 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS), 2004.
-
(2004)
Proc. of 1st European Workshop Security Ad-Hoc Sensor Networks (ESAS)
-
-
Schmidt, S.1
Krahn, H.2
Fischer, S.3
Watjen, D.4
-
38
-
-
34250334357
-
Energy-memory-security tradeoffs in distributed sensor networks
-
in, Article (CrossRef Link)
-
D. D. Hwang, B.C.C. Lai and I. Verbauwhede, "Energy-memory-security tradeoffs in distributed sensor networks", in Proc. of Lecture Notes in Computer Science on Ad-Hoc, Mobile, and Wireless Networks, vol. 3158, 2004. Article (CrossRef Link)
-
(2004)
Proc. of Lecture Notes in Computer Science on Ad-Hoc, Mobile, and Wireless Networks
, vol.3158
-
-
Hwang, D.D.1
Lai, B.C.C.2
Verbauwhede, I.3
-
39
-
-
1542269608
-
Analyzing the energy consumption of security protocols
-
in, Article (CrossRef Link)
-
N. R. Potlapally, S. Ravi, A. Raghunathan and N.K. Jha, "Analyzing the energy consumption of security protocols, " in Proc. of the 2003 International Symposium on Low Power Electronics and Desig, pp. 30-35, 2003. Article (CrossRef Link)
-
(2003)
Proc. of the 2003 International Symposium on Low Power Electronics and Desig
, pp. 30-35
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
40
-
-
33750904440
-
Unleashing public-key cryptography in wireless sensor networks
-
in, Article (CrossRef Link)
-
J. Lopez, "Unleashing public-key cryptography in wireless sensor networks, " in Proc. of Journal of Computer Security, vol. 14, no. 5, pp. 469-482, 2006 Article (CrossRef Link)
-
(2006)
Proc. of Journal of Computer Security
, vol.14
, Issue.5
, pp. 469-482
-
-
Lopez, J.1
-
41
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
in, Article (CrossRef Link)
-
A. S. Wander, N. Gura, H. Eberle, V. Gupta, S. C. Shantz, "Energy analysis of public-key cryptography for wireless sensor networks, " in Proc. of the Third IEEE International Conference on Pervasive Computing and Communication, pp. 324-328, 2005. Article (CrossRef Link)
-
(2005)
Proc. of the Third IEEE International Conference on Pervasive Computing and Communication
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
42
-
-
34547688845
-
Public-key cryptography for RFID-tags
-
in, Article (CrossRef Link)
-
L. Batina, J. Guajardo, T. Kerins, N. Mentens, P. Tuyls and I. Verbauwhede, "Public-key cryptography for RFID-tags, " in Proc. of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 217-222, 2007. Article (CrossRef Link)
-
(2007)
Proc. of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
43
-
-
70349087741
-
A low-resource public-key identification scheme for RFID tags and sensor nodes
-
in, Article (CrossRef Link)
-
Y. Oren and M. Feldhofer, "A low-resource public-key identification scheme for RFID tags and sensor nodes, " in Proc. of the Second ACM Conference on Wireless Network Security, pp. 59-68, 2009. Article (CrossRef Link)
-
(2009)
Proc. of the Second ACM Conference on Wireless Network Security
, pp. 59-68
-
-
Oren, Y.1
Feldhofer, M.2
-
44
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
in, Article (CrossRef Link)
-
H. Chan, A. Perrig and D. Song, "Random key predistribution schemes for sensor networks, " in Proc. of Symposium on Security and Privacy 2003, pp. 197-213, 2003 Article (CrossRef Link)
-
(2003)
Proc. of Symposium on Security and Privacy 2003
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
45
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
Article (CrossRef Link)
-
W. Du, J. Deng, Y.S. Han and P.K. Varshney, "A pairwise key predistribution scheme for wireless sensor networks, ", in Proc. of 10th ACM Conference on Computer and Communications Security, pp. 42-51, 2003. Article (CrossRef Link)
-
(2003)
Proc. of 10th ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
46
-
-
79952574261
-
A light-weight authentication scheme for wireless sensor networks
-
Article (CrossRef Link)
-
Delgado-Mohatar. Oscar, Fuster-Sabater. Amparo and Sierra. Jose. M, "A light-weight authentication scheme for wireless sensor networks, " in Proc. of Journal Ad Hoc Networks, vol. 9, no. 5, pp. 727-735, 2011. Article (CrossRef Link)
-
(2011)
Proc. of Journal Ad Hoc Networks
, vol.9
, Issue.5
, pp. 727-735
-
-
Delgado-Mohatar, O.1
Fuster-Sabater, A.2
Sierra, J.M.3
-
47
-
-
79960408014
-
Secure real-time routing protocol with load distribution in wireless sensor networks
-
Article (CrossRef Link)
-
Ahmed. Adel. Ali and Fisal. Norsheila. Fisal, "Secure real-time routing protocol with load distribution in wireless sensor networks, " in Proc. of Security and Communication Networks, vol. 4, no. 8, pp.839-859, 2011. Article (CrossRef Link)
-
(2011)
Proc. of Security and Communication Networks
, vol.4
, Issue.8
, pp. 839-859
-
-
Ahmed, A.A.1
Fisal, N.F.2
-
48
-
-
79957495757
-
A novel re-authentication scheme based on tickets in wireless local area networks
-
in, Article (CrossRef Link)
-
Guangsong. Li, Jianfeng. Mab, Qi. Jiang and Xi. Chenb, "A novel re-authentication scheme based on tickets in wireless local area networks, " in Proc. of Journal Parallel and Distributed Computing, vol. 71, no. 7, pp. 906-914, 2011. Article (CrossRef Link)
-
(2011)
Proc. of Journal Parallel and Distributed Computing
, vol.71
, Issue.7
, pp. 906-914
-
-
Guangsong, L.1
Jianfeng, M.2
Qi, J.3
Xi, C.4
-
49
-
-
33750133438
-
Security enhancement on a new authentication scheme with anonymity for wireless environments
-
in, Article (CrossRef Link)
-
C.C. Lee, M.S. Hwang and I.E. Liao, "Security enhancement on a new authentication scheme with anonymity for wireless environments, " in Proc. of IEEE Transactions on Industrial Electronics, vol. 53, no. 5, pp. 1683-1687, 2006. Article (CrossRef Link)
-
(2006)
Proc. of IEEE Transactions on Industrial Electronics
, vol.53
, Issue.5
, pp. 1683-1687
-
-
Lee, C.C.1
Hwang, M.S.2
Liao, I.E.3
-
50
-
-
54949140749
-
A secure authentication scheme with anonymity for wireless communications
-
in, Article (CrossRef Link)
-
C.C. Wu, W.B. Lee and W.J. Tsaur, "A secure authentication scheme with anonymity for wireless communications, " in Proc. of IEEE Communications Letters, vol. 12, no. 10, pp. 722-723, 2008. Article (CrossRef Link)
-
(2008)
Proc. of IEEE Communications Letters
, vol.12
, Issue.10
, pp. 722-723
-
-
Wu, C.C.1
Lee, W.B.2
Tsaur, W.J.3
-
51
-
-
59649101587
-
Enhanced authentication scheme with anonymity for roaming service in global mobility networks
-
in, Article (CrossRef Link)
-
C.C. Chang, C.Y. Lee and Y.C. Chiu, "Enhanced authentication scheme with anonymity for roaming service in global mobility networks, " in Proc. of Journal Communications, vol. 32, no. 4, pp. 611-618, 2009. Article (CrossRef Link)
-
(2009)
Proc. of Journal Communications
, vol.32
, Issue.4
, pp. 611-618
-
-
Chang, C.C.1
Lee, C.Y.2
Chiu, Y.C.3
-
52
-
-
68849128250
-
Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment
-
in, Article (CrossRef Link)
-
H.C. Hsiang and W.K. Shih, "Improvement of the secure dynamic ID based remote user authentication scheme for multi-server environment, " in Proc. of Joucnal Computer Standards & Interfaces, vol. 31, no. 6, pp. 1118-1123, 2009. Article (CrossRef Link)
-
(2009)
Proc. of Joucnal Computer Standards & Interfaces
, vol.31
, Issue.6
, pp. 1118-1123
-
-
Hsiang, H.C.1
Shih, W.K.2
-
53
-
-
82755161699
-
Enhanced secure anonymous authentication scheme for roaming service in global mobility networks
-
in, Article (CrossRef Link)
-
Mun Hyeran, Han Kyusuk and Lee Yan Sun, "Enhanced secure anonymous authentication scheme for roaming service in global mobility networks, " in Proc. of Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 214-222, 2012. Article (CrossRef Link)
-
(2012)
Proc. of Mathematical and Computer Modelling
, vol.55
, Issue.1-2
, pp. 214-222
-
-
Hyeran, M.1
Kyusuk, H.2
Sun, L.Y.3
-
54
-
-
78651364381
-
Provably secure authentication protocol with anonymity for roaming service in global mobility networks
-
in, Article (CrossRef Link)
-
Tao. Zhou and Jing. Xu, "Provably secure authentication protocol with anonymity for roaming service in global mobility networks, " in Proc. of Computer Networks, vol. 55, no. 1, pp. 205-213, 2011. Article (CrossRef Link)
-
(2011)
Proc. of Computer Networks
, vol.55
, Issue.1
, pp. 205-213
-
-
Tao, Z.1
Jing, X.2
|