-
1
-
-
80052286748
-
-
2nd edn. Berg Insight, Gothenburg December
-
The Global Wireless MTC Market, 2nd edn. Berg Insight, Gothenburg (December 2009)
-
(2009)
The Global Wireless MTC Market
-
-
-
2
-
-
84857204314
-
-
stage 1, release 11. Technical Report TR 22.368 V11.0.1, 3GPP, Sophia Antipolis, France February
-
Service requirements for machine-type communications (MTC); stage 1, release 11. Technical Report TR 22.368 V11.0.1, 3GPP, Sophia Antipolis, France (February 2011)
-
(2011)
Service Requirements for Machine-type Communications (MTC)
-
-
-
3
-
-
84900609984
-
The LTE Network Architecture: A comprehensive tutorial
-
Sesia, S., Toufik, I., Baker, M. (eds.) John Wiley & Sons
-
Palat, S., Godin, P.: The LTE Network Architecture: A comprehensive tutorial. In: Sesia, S., Toufik, I., Baker, M. (eds.) The UMTS Long Term Evolution: From Theory to Practice. John Wiley & Sons (2009)
-
(2009)
The UMTS Long Term Evolution: From Theory to Practice
-
-
Palat, S.1
Godin, P.2
-
6
-
-
84864797733
-
-
Sophia-Antipolis, France October
-
1st ETSI TC Machine to Machine (M2M) Workshop, Sophia-Antipolis, France (October 2010), http://www.etsi.org/website/newsandevents/past-events/2010- m2mworkshop.aspx
-
(2010)
1st ETSI TC Machine to Machine (M2M) Workshop
-
-
-
7
-
-
84856412630
-
Exploring Diversity: Evaluating the Cost of Frequency Diversity in Communication and Routing
-
Raleigh, NC November
-
Ortiz, J., Culler, D.: Exploring Diversity: Evaluating the Cost of Frequency Diversity in Communication and Routing. In: ACM SenSys, Raleigh, NC (November 2008)
-
(2008)
ACM SenSys
-
-
Ortiz, J.1
Culler, D.2
-
8
-
-
77951102769
-
-
Schneider Electric, Grenoble, France
-
Thonet, G., Allard-Jacquin, P., Colle, P.: ZigBee - WiFi Coexistence. white paper and test report, Schneider Electric, Grenoble, France (2008)
-
(2008)
ZigBee - WiFi Coexistence. White Paper and Test Report
-
-
Thonet, G.1
Allard-Jacquin, P.2
Colle, P.3
-
11
-
-
78049410371
-
The survival of communications in ad hoc and M2M networks: The fundamentals design of architecture and radio technologies used for low-power communication NOMOHI devices
-
Castillo, J.: The survival of communications in ad hoc and M2M networks: The fundamentals design of architecture and radio technologies used for low-power communication NOMOHI devices. In: ITSim 2010, vol. 2, pp. 666-671 (2010)
-
(2010)
ITSim 2010
, vol.2
, pp. 666-671
-
-
Castillo, J.1
-
12
-
-
78049369337
-
Machine-Type-Communication (MTC) Device Grouping Algorithm for Congestion Avoidance of MTC Oriented LTE Network
-
Kim, T.-h., Stoica, A., Chang, R.-S. (eds.) SUComS 2010. Springer, Heidelberg
-
Jung, K., Park, A., Lee, S.: Machine-Type-Communication (MTC) Device Grouping Algorithm for Congestion Avoidance of MTC Oriented LTE Network. In: Kim, T.-h., Stoica, A., Chang, R.-S. (eds.) SUComS 2010. CCIS, vol. 78, pp. 167-178. Springer, Heidelberg (2010)
-
(2010)
CCIS
, vol.78
, pp. 167-178
-
-
Jung, K.1
Park, A.2
Lee, S.3
-
13
-
-
33749988136
-
-
CRC Press, Boca Raton
-
Mišić, J., Mišić, V.B.: Performance modeling and analysis of Bluetooth networks: polling, scheduling, and traffic control. CRC Press, Boca Raton (2006)
-
(2006)
Performance Modeling and Analysis of Bluetooth Networks: Polling, Scheduling, and Traffic Control
-
-
Mišić, J.1
Mišić, V.B.2
-
14
-
-
79959290330
-
Characterization of idle periods in IEEE 802.11e networks
-
Cancun
-
Mišić, J., Mišić, V.B.: Characterization of idle periods in IEEE 802.11e networks. In: IEEE WCNC, Cancun (2011)
-
(2011)
IEEE WCNC
-
-
Mišić, J.1
Mišić, V.B.2
-
15
-
-
33749080732
-
IEEE 802.22: The first worldwide wireless standard based on cognitive radios
-
November 8-11
-
Cordeiro, C., Challapali, K., Birru, D., Sai Shankar, N.: IEEE 802.22: the first worldwide wireless standard based on cognitive radios. In: New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005, November 8-11, pp. 328-337 (2005)
-
(2005)
New Frontiers in Dynamic Spectrum Access Networks, DySPAN 2005
, pp. 328-337
-
-
Cordeiro, C.1
Challapali, K.2
Birru, D.3
Sai Shankar, N.4
-
16
-
-
33744531605
-
Maintaining Reliability through Activity Management in 802.15.4 Sensor Clusters
-
Mišić, J., et al.: Maintaining Reliability through Activity Management in 802.15.4 Sensor Clusters. IEEE Transactions on Vehicular Technology 55(3), 779-788 (2006)
-
(2006)
IEEE Transactions on Vehicular Technology
, vol.55
, Issue.3
, pp. 779-788
-
-
Mišić, J.1
-
17
-
-
36849093556
-
On the economics of GPRS networks with Wi-Fi integration
-
Yaiparoj, S., et al.: On the economics of GPRS networks with Wi-Fi integration. European Journal of Operational Research 187(3), 1459-1475 (2008)
-
(2008)
European Journal of Operational Research
, vol.187
, Issue.3
, pp. 1459-1475
-
-
Yaiparoj, S.1
-
18
-
-
36249025764
-
Modeling credit reservation procedure for UMTS online charging system
-
Sou, S.I., et al.: Modeling credit reservation procedure for UMTS online charging system. IEEE Transactions on Wireless Communications 6(11), 4129-4135 (2007)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.11
, pp. 4129-4135
-
-
Sou, S.I.1
-
19
-
-
33645352668
-
-
Internet Engineering Task Force Network Working Group, Request for Comment (RFC) 2903
-
de Laat, C., Gross, G., Gommans, L.: Generic AAA architecture. Internet Engineering Task Force Network Working Group, Request for Comment (RFC) 2903 (2000)
-
(2000)
Generic AAA Architecture
-
-
De Laat, C.1
Gross, G.2
Gommans, L.3
-
22
-
-
78149349578
-
A study of information security for M2M of IOT
-
August
-
Du, J., Chao, S.W.: A study of information security for M2M of IOT. In: ICACTE 2010, vol. 3, pp. 576-579 (August 2010)
-
(2010)
ICACTE 2010
, vol.3
, pp. 576-579
-
-
Du, J.1
Chao, S.W.2
-
23
-
-
70249090090
-
Trust in M2M communication
-
Cha, I., et al.: Trust in M2M communication. IEEE Veh. Technol. Magazine 4(3), 69-75 (2009)
-
(2009)
IEEE Veh. Technol. Magazine
, vol.4
, Issue.3
, pp. 69-75
-
-
Cha, I.1
-
24
-
-
82155177539
-
Secure lossless aggregation for smart grid MTC networks
-
Bartoli, A., et al.: Secure lossless aggregation for smart grid MTC networks. In: SmartGridComm 2010, pp. 333-338 (2010)
-
(2010)
SmartGridComm 2010
, pp. 333-338
-
-
Bartoli, A.1
-
25
-
-
33745639957
-
-
Technical Report CU-CS-990-05, Dept. of Comp Sci., Univ. of Colorado at Boulder January
-
Hartung, C., Balasalle, J., Han, R.: Node compromise in sensor networks: the need for secure systems. Technical Report CU-CS-990-05, Dept. of Comp Sci., Univ. of Colorado at Boulder (January 2005)
-
(2005)
Node Compromise in Sensor Networks: The Need for Secure Systems
-
-
Hartung, C.1
Balasalle, J.2
Han, R.3
-
28
-
-
23944459661
-
Public Key Cryptography in Sensor Networks - Revisited
-
Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. Springer, Heidelberg
-
Gaubatz, G., Kaps, J.-P., Sunar, B.: Public Key Cryptography in Sensor Networks - Revisited. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds.) ESAS 2004. LNCS, vol. 3313, pp. 2-18. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3313
, pp. 2-18
-
-
Gaubatz, G.1
Kaps, J.-P.2
Sunar, B.3
-
29
-
-
36348942851
-
On concealed data aggregation for WSNs
-
Peter, S., Piotrowski, K., Langendoerfer, P.: On concealed data aggregation for WSNs. In: IEEE Consumer Communications and Networking Conference, pp. 192-196 (2007)
-
(2007)
IEEE Consumer Communications and Networking Conference
, pp. 192-196
-
-
Peter, S.1
Piotrowski, K.2
Langendoerfer, P.3
-
30
-
-
0005301490
-
On data banks and privacy homomorphisms
-
DeMillo, R., Dobkin, D., Jones, A., Lipton, R. (eds.) Academic Press
-
Rivest, R.L., et al.: On data banks and privacy homomorphisms. In: DeMillo, R., Dobkin, D., Jones, A., Lipton, R. (eds.) Foundations of Secure Computation, pp. 169-180. Academic Press (1978)
-
(1978)
Foundations of Secure Computation
, pp. 169-180
-
-
Rivest, R.L.1
-
32
-
-
0020915882
-
Blind signatures for untraceable payments
-
Springer
-
Chaum, D.: Blind signatures for untraceable payments. In: Advances in Cryptology - Crypto 1982, pp. 199-203. Springer (1983)
-
(1983)
Advances in Cryptology - Crypto 1982
, pp. 199-203
-
-
Chaum, D.1
-
33
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport, L.: Password authentication with insecure communication. Commun. of the ACM 24(11), 770-772 (1981)
-
(1981)
Commun. of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
34
-
-
84864804664
-
-
Integrated Project of the European Union's Seventh Framework Programme
-
EXALTED (EXpAnding LTE for Devices), Integrated Project of the European Union's Seventh Framework Programme, http://www.ict-exalted.eu/
-
EXALTED (EXpAnding LTE for Devices)
-
-
|