Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             20 results found
no title author magazine year volume issue page(s) type
1 A multi-dimensional routing based approach for efficient communication inside partitioned social networks Hussain, Ahsan
2018
12 4 p. 830-849
article
2 An adaptable and ISP-friendly multicast overlay network Sampaio, André
2018
12 4 p. 809-829
article
3 An analytical study of the main characteristics of Cluster-based Energy-aware Virtual Ring Routing (CLEVER): Number of clusters, number of hops and cluster diameter Fersi, Ghofrane
2018
12 4 p. 777-788
article
4 An online target tracking protocol for vehicular Ad Hoc networks Derder, Abdessamed
2018
12 4 p. 969-988
article
5 DEHCIC: A distributed energy-aware hexagon based clustering algorithm to improve coverage in wireless sensor networks Zakariayi, Somaieh
2018
12 4 p. 689-704
article
6 FDCP: cache placement model for information-centric networking using fluid dynamics theory Wu, Fan
2018
12 4 p. 789-808
article
7 FINDER: A D2D based critical communications framework for disaster management in 5G Thomas, Anil
2018
12 4 p. 912-923
article
8 Hierarchical P2P architecture for efficient content distribution Hasimoto-Beltran, Rogelio
2018
12 4 p. 724-739
article
9 Intention aware misbehavior detection for post-disaster opportunistic communication over peer-to-peer DTN Chakrabarti, Chandrima
2018
12 4 p. 705-723
article
10 Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing Shen, Jian
2018
12 4 p. 924-933
article
11 Novel energy-efficient secure routing protocol for wireless sensor networks with Mobile sink Kavidha, V.
2018
12 4 p. 881-892
article
12 Pareto set as a model for dispatching resources in emergency Centres Guedes, Ricardo
2018
12 4 p. 865-880
article
13 Performance analysis of a locality-aware BitTorrent protocol in enterprise networks D’Alessandro Costa, Marco Antonio
2018
12 4 p. 751-762
article
14 Pruneable sharding-based blockchain protocol Feng, Xiaoqin
2018
12 4 p. 934-950
article
15 PSEH: A provably secure and efficient handover AKA protocol in LTE/LTE-A network Gupta, Shubham
2018
12 4 p. 989-1011
article
16 Reputation based approach for improved fairness and robustness in P2P protocols Nwebonyi, Francis N.
2018
12 4 p. 951-968
article
17 Secure deduplication with reliable and revocable key management in fog computing Kwon, Hyunsoo
2018
12 4 p. 850-864
article
18 Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds Li, Jinguo
2018
12 4 p. 893-911
article
19 Service-differentiated QoS routing based on ant colony optimisation for named data networking Hou, Rui
2018
12 4 p. 740-750
article
20 Using self-regulation to increase resilience in overlay networks for interactive multimedia communications Nuño, Pelayo
2018
12 4 p. 763-776
article
                             20 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands