International Journal of Wireless and Microwave Technologies(IJWMT)

ISSN: 2076-1449(Print),ISSN: 2076-9539(Online)
DOI: 10.5815/ijwmt

 

Published By: MECS Publisher

 

 

Contents

 

REGULAR PAPERS

 

 

Efficient Homomorphic Hashing Approach for Secure Reprogramming in Wireless Sensor Networks

Yu Zhang,Xing She Zhou,Yee Wei Law,Marimuthu Palaniswami

Abstract | References | Full Paper: PDF (Size:270KB), PP.1-9, Pub. Date: 2012-2-15

DOI: 10.5815/ijwmt.2012.01.01


 

Identifying Sentiment in Web Multi-topic Documents

Na Fan

Abstract | References | Full Paper: PDF (Size:188KB), PP.10-16, Pub. Date: 2012-2-15
DOI: 10.5815/ijwmt.2012.01.02

 

 

A Design of Trust Degree Transfer Algorithm for P2P Network

Wang Hao-yu,Ge Tong-min,Ji Xiao-juan,Hu Bao-an

Abstract | References | Full Paper: PDF (Size:197KB), PP.17-22, Pub. Date: 2012-2-15
DOI: 10.5815/ijwmt.2012.01.03

 

 

A Method of Target Detection in Remote Sensing Image Captured based for Sensor Network

Yingchun Shen,Hai Jin

Abstract | References | Full Paper: PDF (Size:225KB), PP.23-29, Pub. Date: 2012-2-15
DOI: 10.5815/ijwmt.2012.01.04

 

 

Research on Audience Rating Statistics of Two-way Digital TV Based on OpenSSL

Chen Junhua,Yang Fan

Abstract | References | Full Paper: PDF (Size:178KB), PP.30-37, Pub. Date: 2012-2-15
DOI: 10.5815/ijwmt.2012.01.05

 

 

Defense on Split-Network Attack in Wireless Sensor Network

Du Chunlai,hang Jianshun,Ma Li

Abstract | References | Full Paper: PDF (Size:198KB), PP.38-44, Pub. Date: 2012-2-15
DOI: 10.5815/ijwmt.2012.01.06

 

 

An Unconditionally Secure Authentication Code For Multi-Source Network Coding

Hong Yang,Mingxi Yang

Abstract | References | Full Paper: PDF (Size:140KB), PP.45-52, Pub. Date: 2012-2-15
DOI: 10.5815/ijwmt.2012.01.07

 

 

Efficient Proxy Re-encryption with Private Searching in the Untrusted Cloud

Xi Chen,Yong Li

Abstract | References | Full Paper: PDF (Size:276KB), PP.53-59, Pub. Date: 2012-2-15
DOI: 10.5815/ijwmt.2012.01.08

 

 

A double auction scheme based on secret sharing and safe comparing protocol

Bin Zhang,Qiuliang Xu,Han Jiang

Abstract | References | Full Paper: PDF (Size:218KB), PP.60-65, Pub. Date: 2012-2-15
DOI: 10.5815/ijwmt.2012.01.09

 

 

Adaptive Cross-layer Resource Allocation by HNN in OFDM-MISO System

Mingyan Jiang,Yulong Liu

Abstract | References | Full Paper: PDF (Size:224KB), PP.66-73, Pub. Date: 2012-2-15
DOI: 10.5815/ijwmt.2012.01.10