| Trustworthiness, Reliability and Services in Ubiquitous and Sensor Networks | |
| Attack-Resilient Random Key Distribution Scheme for Distributed Sensor Networks | p. 1 |
| A Critical Approach to Privacy Research in Ubiquitous Environments - Issues and Underlying Assumptions | p. 12 |
| The Case Study of Information Security System for International Airports | p. 22 |
| Quantitative Evaluation of Intrusion Tolerant Systems Subject to DoS Attacks Via Semi-markov Cost Models | p. 31 |
| An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System | p. 43 |
| UPS - An Ubiquitous Proximity eService for Trust Collaboration | p. 57 |
| Obligations for Privacy and Confidentiality in Distributed Transactions | p. 69 |
| Multi-channel Enhancements for IEEE 802.11-Based Multi-hop Ad-Hoc Wireless Networks | p. 82 |
| An Intelligent Event-Driven Interface Agent for Interactive Digital Contents in Ubiquitous Environments | p. 93 |
| A Loop-Based Key Management Scheme for Wireless Sensor Networks | p. 103 |
| A MAC Protocol with Little Idle Listening for Wireless Sensor Networks | p. 115 |
| Security Technologies Based on Home Gateway for Making Smart Home Secure | p. 124 |
| Layered Peer to Peer Streaming Using Hidden Markov Models | p. 136 |
| Optimum Power Controller for Random Number Generator in the Crypto Module of Ubiquitous Computing Environment | p. 146 |
| Problem Localization for Automated System Management in Ubiquitous Computing | p. 158 |
| System and Software for Wireless SoC | |
| A High Speed Analog to Digital Converter for Ultra Wide Band Applications | p. 169 |
| Design and DSP Software Implementation of Mobile WiMAX Baseband Transceiver Functions | p. 181 |
| Cross-Layer Design for IEEE 802.16-2005 System Using Platform-Based Methodologies | p. 193 |
| A Dynamic Frequency Allocation Scheme for IEEE 802.16 OFDMA-Based WMANs Using Hungary Algorithm | p. 205 |
| Wireless Network Management System for WiMAX / Wi-Fi Mesh Networks | p. 215 |
| An Implementation of QoS Framework for Heterogeneous Networks | p. 226 |
| An Energy-Efficient MAC Design for IEEE 802.15.4-Based Wireless Sensor Networks | p. 237 |
| A Cross-Layer Signaling and Middleware Platform for Multi-interface Mobile Devices | p. 249 |
| Enhanced Sleep Mode Operations for Energy Saving in IEEE 802.16e | p. 261 |
| Enhanced Fingerprint-Based Location Estimation System in Wireless LAN Environment | p. 273 |
| Improving Channel Scanning Procedures for WLAN Handoffs | p. 285 |
| Network Centric Ubiquitous Systems | |
| A Multicast Extension for Enhanced Mobile IP by Home Agent Handover | p. 297 |
| Autonomic Multi-server Distribution in Flash Crowds Alleviation Network | p. 309 |
| Generic Energy-Efficient Geographic Routing for Ad-Hoc Wireless Networks | p. 321 |
| Description of a New Feature Meta-model | p. 333 |
| Studying of Multi-dimensional Based Replica Management in Object Storage System | p. 341 |
| Communication Model Exploration for Distributed Embedded Systems and System Level Interpretations | p. 355 |
| An End-to-End QoS Adaptation Architecture for the Integrated IntServ and DiffServ Networks | p. 365 |
| Ubiquitous Laboratory: A Research Support Environment for Ubiquitous Learning Based on Sensor Networks | p. 377 |
| Intelligent Monitoring Using Wireless Sensor Networks | p. 389 |
| On the Design of Micro-mobility for Mobile Network | p. 401 |
| Answer: Adaptive Network Selection in WLAN/UMTS EnviRonment | p. 413 |
| Self-authorized Public Key Management for Home Networks | p. 425 |
| A Cross-Layered Diagnostician in OSGi Platform for Home Network | p. 435 |
| Ubiquitous Underwater Acoustic-Sensor Network | |
| LaMSM: Localization Algorithm with Merging Segmented Maps for Underwater Sensor Networks | p. 445 |
| TinyOS-Based Gateway for Underwater Acoustics/Radio Frequency Communication | p. 455 |
| An Energy Scheduling Algorithm for Ensuring the Pre-determined Lifetime in Sensor Network | p. 467 |
| Underwater Acoustic Communication and Modem-Based Navigation Aids | p. 474 |
| State-of-the-Art in MAC Protocols for Underwater Acoustics Sensor Networks | p. 482 |
| An Ultrasonic Sensor Based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks | p. 494 |
| UWA-NAV - Energy Efficient Error Control Scheme for Underwater Acoustic Sensor Network | p. 505 |
| Underwater Wideband Source Localization Using the Interference Pattern Matching | p. 515 |
| A New Virtual Select Database Operation for Wireless Sensor Networks | p. 523 |
| GT[superscript 2] - Reduced Wastes Time Mechanism for Underwater Acoustic Sensor Network | p. 531 |
| RFID and Ubiquitous Sensor Networks | |
| Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks | p. 538 |
| An Efficient Mutual Authentication Protocol on RFID Tags | p. 550 |
| HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System | p. 557 |
| Target Classification in Sparse Sampling Acoustic Sensor Networks Using IDDC Algorithm | p. 568 |
| Scriptable Sensor Network Based Home-Automation | p. 579 |
| Applying Situation Awareness to Mobile Proactive Information Delivery | p. 592 |
| Embedded Software Optimization | |
| Energy-Efficiency on a Variable-Bitrate Device | p. 604 |
| The Secure DAES Design for Embedded System Application | p. 617 |
| Software Power Peak Reduction on Smart Card Systems Based on Iterative Compiling | p. 627 |
| Simultaneous Operation Scheduling and Operation Delay Selection to Minimize Cycle-by-Cycle Power Differential | p. 638 |
| A Simple Approach to Robust Optimal Pole Assignment of Decentralized Stochastic Singularly-Perturbed Computer Controlled Systems | p. 648 |
| Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems | p. 660 |
| Evaluating Modeling Solutions on Their Ability to Support the Partitioning of Automotive Embedded Systems | p. 674 |
| Security in Ubiquitous Computing | |
| Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006 | p. 686 |
| New Efficient Certificateless Signature Scheme | p. 692 |
| A Practical Identity-Based Signature Scheme from Bilinear Map | p. 704 |
| Linkable Ring Signatures from Linear Feedback Shift Register | p. 716 |
| A Simple and Efficient Key Exchange Scheme Against the Smart Card Loss Problem | p. 728 |
| A Key Distribution Scheme Preventing Collusion Attacks in Ubiquitous Heterogeneous Sensor Networks | p. 745 |
| Token-Based Authenticated Key Establishment Protocols for Three-Party Communication | p. 758 |
| Two Approaches on Pairwise Key Path Establishment for Sensor Networks | p. 770 |
| An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks | p. 781 |
| Low-Cost and Strong-Security RFID Authentication Protocol | p. 795 |
| A Ticket Based Binding Update Authentication Method for Trusted Nodes in Mobile IPv6 Domain | p. 808 |
| Author Index | p. 821 |
| Table of Contents provided by Ingram. All Rights Reserved. |