Data storage on a RFID tag for a distributed system
Sarita Pais and Judith Symonds, IJU Journal, Vol.2, No.2, April 2011, PP. 26-39 DOI:10.5121/iju.2011.2203 |
Practical attacks on a RFID authentication Protocol Conforming to EPC C-1 G-2 Standard
MohammadHassan Habibi, Mahmud Gardeshi and Mahdi R. Alaghband, IJU Journal, Vol.2, No.1, January 2011, PP. 1-13 DOI : 10.5121/iju.2011.2101 |
CDTOM: A Context-Driven Task-Oriented Middleware for Pervasive
Homecare Environment Hongbo Ni, Bessam Abdulrazak, Daqing Zhang and Shu Wu, IJU Journal, Vol.2, No.1, January 2011, PP. 34-53 DOI : 10.5121/iju.2011.2103 |
SULMA: A Secure Ultra Light-Weight Mutual Authentication Protocol for Low Cost RFID Tags
Mehrdad Kianersi, Mahmoud Gardeshi and Mohammad Arjmand, IJU Journal, Vol.2, No.2, April 2011, PP. 17-24 DOI : 10.5121/iju.2011.2202 |
Time Synchronization in Wireless Sensor Networks: A Survey
Prakash Ranganathan and Kendall Nygard, IJU Journal, Vol.1,No.2,April 2010, PP. 92-102 DOI : 10.5121/iju.2010.1206 |
An Intelligent Driver Assistance System (I-DAS) for Vehicle Safety Modelling Using Ontology Approach
Saravanan Kannan, Arunkumar Thangavelu and RameshBabu Kalivaradhan, IJU Journal, Vol.1, No.3, July 2010, PP. 15-29 DOI : 10.5121/iju.2010.1302 |
Security Enhancement with Optimal QOS using EAP-AKA in Hybrid Coupled 3G-WLAN Convergence Network
R. Shankar, Timothy Rajkumar K and P. Dananjayan, IJU Journal, Vol.1, No.3, July 2010, PP. 31-42 DOI : 10.5121/iju.2010.1303 |
A Non-Cooperative Game Theoretical Approach for Power Control in Virtual MIMO Wireless Sensor Network
R.Valli and P.Dananjayan, IJU Journal, Vol.1, No.3, July 2010, PP. 44-55 DOI : 10.5121/iju.2010.1304 |
Interaction with Tilting Gestures in Ubiquitous Environments
Ayman Atia and Jiro Tanaka, IJU Journal, Vol.1, No.3, July 2010, PP. 1-13 DOI : 10.5121/iju.2010.1301 |