Andrea Bottoni, Gianluca Dini Improving authentication of remote card transactions with mobile personal trusted devices. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:8, pp:1697-1712 [Journal]
Gwo-Jong Yu, Chih-Yung Chang An efficient cluster-based multi-channel management protocol for wireless Ad Hoc networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:8, pp:1742-1753 [Journal]
Chee Onn Chow, Hiroshi Ishii Enhancing real-time video streaming over mobile ad hoc networks using multipoint-to-point communication. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:8, pp:1754-1764 [Journal]
Soojung Lee A deadlock detection mechanism for true fully adaptive routing in regular wormhole networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:8, pp:1826-1840 [Journal]
Lei Guang, Chadi Assi, Yinghua Ye DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:8, pp:1841-1853 [Journal]
Namhoon Kim, Soyeon Ahn, Younghee Lee AROD: An address autoconfiguration with address reservation and optimistic duplicated address detection for mobile ad hoc networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2007, v:30, n:8, pp:1913-1925 [Journal]