


default search action
International Journal of Business Data Communications and Networking, Volume 13
Volume 13, Number 1, 2017
- Mamata Rath

, Binod Kumar Pattanayak:
MAQ: A Mobile Agent Based Quality of Service Platform for MANETs. 1-8 - Manali Chandnani, Mukesh Kumar Khandelwal, Meeta Sharma:

A Survey on Synchronization Approach in MAC Layer Protocols. 9-27 - Geetanjali Rathee, Hemraj Saini

:
Secure Buffer-Based Routing Protocol for WMN. 28-44 - Oshin Sharma, Hemraj Saini

:
Performance Evaluation of VM Placement Using Classical Bin Packing and Genetic Algorithm for Cloud Environment. 45-57 - Yerra Shankar Rao

, Aswin Kumar Rauta, Hemraj Saini
, Tarini Charana Panda:
Mathematical Model for Cyber Attack in Computer Network. 58-65 - Prerna Mohit, G. P. Biswas:

Modification of Traditional RSA into Symmetric-RSA Cryptosystems. 66-73 - Rifaqat Ali

, Arup Kumar Pal
:
A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem. 74-84 - Preeti Chandrakar, Hari Om:

Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment. 85-101 - Munish Sabharwal

:
Multi-Modal Biometric Authentication and Secure Transaction Operation Framework for E-Banking. 102-116
Volume 13, Number 2, 2017
- Yanjing Hu, Qingqi Pei:

Dynamic Combined with Static Analysis for Mining Network Protocol's Hidden Behavior. 1-14 - Peng Li, Huqing Nie, He Xu, Lu Dong:

A Minimum-Aware Container Live Migration Algorithm in the Cloud Environment. 15-27 - Jialin Ma, Yongjun Zhang, Lin Zhang, Kun Yu, Jinlin Liu:

Bi-Term Topic Model for SMS Classification. 28-40 - Wei Qi, Hongwei Zhuang, Fadong Zhao:

A Special Collaborative Information System and Its Application in Kinetic Energy Impact. 41-54 - Ruilian Tan, Zhe Li, Peng Bai, Kai Shi, Baoxiang Ren, Xuhua Wang:

Directional AF Cooperative Communication System Based on Outage Probability. 55-68 - He Xu, Ye Ding, Peng Li, Ruchuan Wang:

Indoor Localization Using the Reference Tags and Phase of Passive UHF-RFID Tags. 69-82 - Taiming Zhu, Yuanbo Guo, Ankang Ju, Jun Ma, Xu An Wang

:
An Insider Threat Detection Method Based on Business Process Mining. 83-98

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














