![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
NSysS 2016: Dhaka, Bangladesh
- International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016. IEEE 2016, ISBN 978-1-5090-0203-0
- Tareq Anwer Sohan, Hasib Hamidul Haque, Asif Hasan, Jahidul Islam, Alim Al Islam:
A graph coloring based dynamic channel assignment algorithm for cognitive radio vehicular Ad Hoc networks. 1-8 - Khairul Alam, Kazi Md. Rokibul Alam, Omar Faruq
, Yasuhiko Morimoto:
A comparison between RSA and ElGamal based untraceable blind signature schemes. 1-4 - Sujan Sarker, Amit Kumar Nath
, Md. Abdur Razzaque:
Tradeoffs between sensing quality and energy efficiency for context monitoring applications. 1-7 - Marufur Rahman, Rezaul Karim:
Comparative study of different methods of social network analysis and visualization. 1-7 - Nazmul Islam:
Certificate revocation in vehicular Ad Hoc networks: a novel approach. 1-5 - Mamtaj Akter
, Alimul Islam, Ashikur Rahman
:
Fault tolerant optimized broadcast for wireless Ad-Hoc networks. 1-9 - Sajeda Akter, Farzana Rahman, A. B. M. Alim Al Islam:
Securing app distribution process of iOS exploiting the notion of authentic update. 1-8 - Mohammad Saifur Rahman, Yusuf Sarwar Uddin
, M. Sohel Rahman
, M. Kaykobad:
Using adaptive heartbeat rate on long-lived TCP connections. 1-9 - Sharif Hossen, Muhammad Sajjadur Rahim
:
Impact of mobile nodes for few mobility models on delay-tolerant network routing protocols. 1-6 - Saidur Rahman, Anika Anzum Prima, Md. Abdur Razzaque:
Optimal allocation of 3G budget for smartphones running heterogeneous applications. 1-6 - Nova Ahmed
, Md. Abul Kalam Azad, Mahmudur Rahman Khan, Ahsan Habib, Shuvashish Ghosh, Sabiha Shahid:
ShonaBondhu: a cloud based system to handle flash flood. 1-6 - Afroza Sultana, Mahmuda Naznin
, Rifat Shahriyar:
Conflicting goal constrained architecture of a heterogeneous mobile sensor network. 1-6 - Shahidul Islam Khan
, Abu Sayed Md. Latiful Hoque:
Privacy and security problems of national health data warehouse: a convenient solution for developing countries. 1-6 - Nusrat Jahan Oishi, Arafin Mahamud, Asaduzzaman
:
Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6. 1-5 - A. H. M. Kamal
, Mohammad Mahfuzul Islam:
Enhancing the embedding payload by handling the affair of association and mapping of block pixels through prediction errors histogram. 1-8 - Iftakhar Ahmad, Sinthia Kabir, Tanzila Choudhury, A. B. M. Alim Al Islam:
Enhancing security in specialized use of mobile IP. 1-9 - Saiyma Sarmin, Saurabh Bagchi, Alim Al Islam:
Chameleon: defending secret information from eavesdropping over physical environment. 1-5 - Kazi Sinthia Kabir
, Tusher Chakraborty, A. B. M. Alim Al Islam:
Supercrypt: a technique for quantum cryptography through simultaneously improving both security level and data rate. 1-9 - Annajiat Alim Rasel
, Mohammed Eunus Ali
:
UProve2: privacy-aware, scalable, ubiquitous provenance to enhance file search. 1-5 - Fariha Tasmin Jaigirdar, Mohammad Mahfuzul Islam:
A new cost-effective approach for battlefield surveillance in wireless sensor networks. 1-6 - Mofijul Islam, Md. Abdur Razzaque, Jahidul Islam:
A genetic algorithm for virtual machine migration in heterogeneous mobile cloud computing. 1-6 - Sayef Azad Sakin, Md. Abdur Razzaque:
Game theoretic downlink resource scheduling for self-coexisting cognitive radio networks. 1-7
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.