nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A multi-dimensional routing based approach for efficient communication inside partitioned social networks
|
Hussain, Ahsan |
|
2018 |
12 |
4 |
p. 830-849 |
artikel |
2 |
An adaptable and ISP-friendly multicast overlay network
|
Sampaio, André |
|
2018 |
12 |
4 |
p. 809-829 |
artikel |
3 |
An analytical study of the main characteristics of Cluster-based Energy-aware Virtual Ring Routing (CLEVER): Number of clusters, number of hops and cluster diameter
|
Fersi, Ghofrane |
|
2018 |
12 |
4 |
p. 777-788 |
artikel |
4 |
An online target tracking protocol for vehicular Ad Hoc networks
|
Derder, Abdessamed |
|
2018 |
12 |
4 |
p. 969-988 |
artikel |
5 |
DEHCIC: A distributed energy-aware hexagon based clustering algorithm to improve coverage in wireless sensor networks
|
Zakariayi, Somaieh |
|
2018 |
12 |
4 |
p. 689-704 |
artikel |
6 |
FDCP: cache placement model for information-centric networking using fluid dynamics theory
|
Wu, Fan |
|
2018 |
12 |
4 |
p. 789-808 |
artikel |
7 |
FINDER: A D2D based critical communications framework for disaster management in 5G
|
Thomas, Anil |
|
2018 |
12 |
4 |
p. 912-923 |
artikel |
8 |
Hierarchical P2P architecture for efficient content distribution
|
Hasimoto-Beltran, Rogelio |
|
2018 |
12 |
4 |
p. 724-739 |
artikel |
9 |
Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN
|
Chakrabarti, Chandrima |
|
2018 |
12 |
4 |
p. 705-723 |
artikel |
10 |
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
|
Shen, Jian |
|
2018 |
12 |
4 |
p. 924-933 |
artikel |
11 |
Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink
|
Kavidha, V. |
|
2018 |
12 |
4 |
p. 881-892 |
artikel |
12 |
Pareto set as a model for dispatching resources in emergency Centres
|
Guedes, Ricardo |
|
2018 |
12 |
4 |
p. 865-880 |
artikel |
13 |
Performance analysis of a locality-aware BitTorrent protocol in enterprise networks
|
D’Alessandro Costa, Marco Antonio |
|
2018 |
12 |
4 |
p. 751-762 |
artikel |
14 |
Pruneable sharding-based blockchain protocol
|
Feng, Xiaoqin |
|
2018 |
12 |
4 |
p. 934-950 |
artikel |
15 |
PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network
|
Gupta, Shubham |
|
2018 |
12 |
4 |
p. 989-1011 |
artikel |
16 |
Reputation based approach for improved fairness and robustness in P2P protocols
|
Nwebonyi, Francis N. |
|
2018 |
12 |
4 |
p. 951-968 |
artikel |
17 |
Secure deduplication with reliable and revocable key management in fog computing
|
Kwon, Hyunsoo |
|
2018 |
12 |
4 |
p. 850-864 |
artikel |
18 |
Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds
|
Li, Jinguo |
|
2018 |
12 |
4 |
p. 893-911 |
artikel |
19 |
Service-differentiated QoS routing based on ant colony optimisation for named data networking
|
Hou, Rui |
|
2018 |
12 |
4 |
p. 740-750 |
artikel |
20 |
Using self-regulation to increase resilience in overlay networks for interactive multimedia communications
|
Nuño, Pelayo |
|
2018 |
12 |
4 |
p. 763-776 |
artikel |