no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
An adaptive algorithm for super-peer selection considering peer’s capacity in mobile peer-to-peer networks based on learning automata
|
Amirazodi, Nahid |
|
2016 |
11 |
1 |
p. 74-89 |
article |
2 |
An efficient and secure three-factor based authenticated key exchange scheme using elliptic curve cryptosystems
|
Han, Lidong |
|
2016 |
11 |
1 |
p. 63-73 |
article |
3 |
An efficient privacy-preserving P2P protocol for computing maximum value in the presence of active adversaries
|
Ashouri-Talouki, Maede |
|
2016 |
11 |
1 |
p. 34-43 |
article |
4 |
An improved and provably secure three-factor user authentication scheme for wireless sensor networks
|
Wu, Fan |
|
2016 |
11 |
1 |
p. 1-20 |
article |
5 |
A robust power control scheme for femtocell networks with probability constraint of channel gains
|
Liu, Zhixin |
|
2016 |
11 |
1 |
p. 21-33 |
article |
6 |
A traffic congestion aware vehicle-to-vehicle communication framework based on Voronoi diagram and information granularity
|
Li, Gang |
|
2016 |
11 |
1 |
p. 124-138 |
article |
7 |
CTMR-collaborative time-stamp based multicast routing for delay tolerant networks in post disaster scenario
|
Gupta, Amit Kumar |
|
2016 |
11 |
1 |
p. 162-180 |
article |
8 |
Delay-tolerant sensing data delivery for IoT network by using signal strength information
|
Kim, Sun-Hyun |
|
2016 |
11 |
1 |
p. 181-197 |
article |
9 |
Distributed scheduling using belief propagation for internet-of-things (IoT) networks
|
Sohn, Illsoo |
|
2016 |
11 |
1 |
p. 152-161 |
article |
10 |
Editor’s note: From M2M to IoT: Platform, Network and Service
|
|
|
2017 |
11 |
1 |
p. 101 |
article |
11 |
OPPO: An optimal copy allocation scheme in mobile opportunistic networks
|
Yuan, Peiyan |
|
2016 |
11 |
1 |
p. 102-109 |
article |
12 |
Peer-to-peer live video streaming with rateless codes for massively multiplayer online games
|
Ahmad, Shakeel |
|
2016 |
11 |
1 |
p. 44-62 |
article |
13 |
Resource allocation for M2M-enabled cellular network using Nash bargaining game theory
|
Wang, Gang |
|
2016 |
11 |
1 |
p. 110-123 |
article |
14 |
Sensor communication area and node extend routing algorithm in opportunistic networks
|
Wu, Jia |
|
2016 |
11 |
1 |
p. 90-100 |
article |
15 |
Towards secure authenticating of cache in the reader for RFID-based IoT systems
|
Li, Chun-Ta |
|
2017 |
11 |
1 |
p. 198-208 |
article |
16 |
Towards the oneM2M standards for building IoT ecosystem: Analysis, implementation and lessons
|
Kim, Jaeho |
|
2016 |
11 |
1 |
p. 139-151 |
article |