Stop the war!
Остановите войну!
for scientists:
default search action
International Journal of Business Data Communications and Networking, Volume 13
Volume 13, Number 1, 2017
- Mamata Rath, Binod Kumar Pattanayak:
MAQ: A Mobile Agent Based Quality of Service Platform for MANETs. 1-8 - Manali Chandnani, Mukesh Kumar Khandelwal, Meeta Sharma:
A Survey on Synchronization Approach in MAC Layer Protocols. 9-27 - Geetanjali Rathee, Hemraj Saini:
Secure Buffer-Based Routing Protocol for WMN. 28-44 - Oshin Sharma, Hemraj Saini:
Performance Evaluation of VM Placement Using Classical Bin Packing and Genetic Algorithm for Cloud Environment. 45-57 - Yerra Shankar Rao, Aswin Kumar Rauta, Hemraj Saini, Tarini Charana Panda:
Mathematical Model for Cyber Attack in Computer Network. 58-65 - Prerna Mohit, G. P. Biswas:
Modification of Traditional RSA into Symmetric-RSA Cryptosystems. 66-73 - Rifaqat Ali, Arup Kumar Pal:
A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem. 74-84 - Preeti Chandrakar, Hari Om:
Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment. 85-101 - Munish Sabharwal:
Multi-Modal Biometric Authentication and Secure Transaction Operation Framework for E-Banking. 102-116
Volume 13, Number 2, 2017
- Yanjing Hu, Qingqi Pei:
Dynamic Combined with Static Analysis for Mining Network Protocol's Hidden Behavior. 1-14 - Peng Li, Huqing Nie, He Xu, Lu Dong:
A Minimum-Aware Container Live Migration Algorithm in the Cloud Environment. 15-27 - Jialin Ma, Yongjun Zhang, Lin Zhang, Kun Yu, Jinlin Liu:
Bi-Term Topic Model for SMS Classification. 28-40 - Wei Qi, Hongwei Zhuang, Fadong Zhao:
A Special Collaborative Information System and Its Application in Kinetic Energy Impact. 41-54 - Ruilian Tan, Zhe Li, Peng Bai, Kai Shi, Baoxiang Ren, Xuhua Wang:
Directional AF Cooperative Communication System Based on Outage Probability. 55-68 - He Xu, Ye Ding, Peng Li, Ruchuan Wang:
Indoor Localization Using the Reference Tags and Phase of Passive UHF-RFID Tags. 69-82 - Taiming Zhu, Yuanbo Guo, Ankang Ju, Jun Ma, Xu An Wang:
An Insider Threat Detection Method Based on Business Process Mining. 83-98
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.