Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             16 results found
no title author magazine year volume issue page(s) type
1 An adaptive algorithm for super-peer selection considering peer’s capacity in mobile peer-to-peer networks based on learning automata Amirazodi, Nahid
2016
11 1 p. 74-89
article
2 An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems Han, Lidong
2016
11 1 p. 63-73
article
3 An efficient privacy-preserving P2P protocol for computing maximum value in the presence of active adversaries Ashouri-Talouki, Maede
2016
11 1 p. 34-43
article
4 An improved and provably secure three-factor user authentication scheme for wireless sensor networks Wu, Fan
2016
11 1 p. 1-20
article
5 A robust power control scheme for femtocell networks with probability constraint of channel gains Liu, Zhixin
2016
11 1 p. 21-33
article
6 A traffic congestion aware vehicle-to-vehicle communication framework based on Voronoi diagram and information granularity Li, Gang
2016
11 1 p. 124-138
article
7 CTMR-collaborative time-stamp based multicast routing for delay tolerant networks in post disaster scenario Gupta, Amit Kumar
2016
11 1 p. 162-180
article
8 Delay-tolerant sensing data delivery for IoT network by using signal strength information Kim, Sun-Hyun
2016
11 1 p. 181-197
article
9 Distributed scheduling using belief propagation for internet-of-things (IoT) networks Sohn, Illsoo
2016
11 1 p. 152-161
article
10 Editor’s note: From M2M to IoT: Platform, Network and Service 2017
11 1 p. 101
article
11 OPPO: An optimal copy allocation scheme in mobile opportunistic networks Yuan, Peiyan
2016
11 1 p. 102-109
article
12 Peer-to-peer live video streaming with rateless codes for massively multiplayer online games Ahmad, Shakeel
2016
11 1 p. 44-62
article
13 Resource allocation for M2M-enabled cellular network using Nash bargaining game theory Wang, Gang
2016
11 1 p. 110-123
article
14 Sensor communication area and node extend routing algorithm in opportunistic networks Wu, Jia
2016
11 1 p. 90-100
article
15 Towards secure authenticating of cache in the reader for RFID-based IoT systems Li, Chun-Ta
2017
11 1 p. 198-208
article
16 Towards the oneM2M standards for building IoT ecosystem: Analysis, implementation and lessons Kim, Jaeho
2016
11 1 p. 139-151
article
                             16 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands