no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A fault tolerant peer-to-peer spatial data structure
|
Bisadi, Pouya |
|
2016 |
10 |
4 |
p. 874-886 |
article |
2 |
An authenticated group key transfer protocol using elliptic curve cryptography
|
Jaiswal, Priyanka |
|
2016 |
10 |
4 |
p. 857-864 |
article |
3 |
Applying location estimation for reliable routing in tactical unmanned ground vehicle networks
|
Thulasiraman, Preetha |
|
2016 |
10 |
4 |
p. 1034-1050 |
article |
4 |
Computational data privacy in wireless networks
|
Wang, Jian |
|
2016 |
10 |
4 |
p. 865-873 |
article |
5 |
Concurrently deniable ring authentication and its application to LBS in VANETs
|
Zeng, Shengke |
|
2016 |
10 |
4 |
p. 844-856 |
article |
6 |
Energy-optimal collaborative file distribution in wired networks
|
Verma, Kshitiz |
|
2016 |
10 |
4 |
p. 925-944 |
article |
7 |
HyCube: A distributed hash table based on a variable metric
|
Olszak, Artur |
|
2016 |
10 |
4 |
p. 954-982 |
article |
8 |
Improving the reliability of wireless data communication in Smart Grid NAN
|
Mohammadi Nejad, Hossein |
|
2016 |
10 |
4 |
p. 1021-1033 |
article |
9 |
Joint TAS and power allocation for D2D cooperative networks
|
Xu, Lingwei |
|
2016 |
10 |
4 |
p. 945-953 |
article |
10 |
Low-complexity time synchronization for energy-constrained wireless sensor networks: Dual-Clock delayed-message approach
|
Lee, Yao-Ren |
|
2016 |
10 |
4 |
p. 887-896 |
article |
11 |
Minimizing mobile sensor movements to form a line K-coverage
|
Wang, Yang |
|
2016 |
10 |
4 |
p. 1063-1078 |
article |
12 |
MobiStore: A system for efficient mobile P2P data sharing
|
Khan, Mohammad A |
|
2016 |
10 |
4 |
p. 910-924 |
article |
13 |
Novel authentication procedures for preventing unauthorized access in social networks
|
Joe, M. Milton |
|
2016 |
10 |
4 |
p. 833-843 |
article |
14 |
Protecting against malicious and selective forwarding attacks for P2P search & retrieval system
|
Chuang, Yung-Ting |
|
2016 |
10 |
4 |
p. 1079-1100 |
article |
15 |
QMRPRNS: Design of QoS multicast routing protocol using reliable node selection scheme for MANETs
|
Yadav, Ajay Kumar |
|
2016 |
10 |
4 |
p. 897-909 |
article |
16 |
Quality enhancement of video on demand implementation in peer-to-peer networks by optimum chunk length in the BitTorrent
|
Mohammadi Sarband, Narges |
|
2016 |
10 |
4 |
p. 1051-1062 |
article |
17 |
TAPCS: Traffic-aware pseudonym changing strategy for VANETs
|
Boualouache, Abdelwahab |
|
2016 |
10 |
4 |
p. 1008-1020 |
article |
18 |
The IoT electric business model: Using blockchain technology for the internet of things
|
Zhang, Yu |
|
2016 |
10 |
4 |
p. 983-994 |
article |
19 |
Uncertainty analysis framework for trust based routing in MANET
|
Thorat, Sandeep A. |
|
2016 |
10 |
4 |
p. 1101-1111 |
article |
20 |
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel
|
Miao, Yinbin |
|
2016 |
10 |
4 |
p. 995-1007 |
article |