Search

Your search keyword '"COMPUTER network protocols"' showing total 205 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Journal international journal of communication systems Remove constraint Journal: international journal of communication systems
205 results on '"COMPUTER network protocols"'

Search Results

1. Taylor political optimizer‐based cluster head selection in IOT‐assisted WSN networks.

2. An efficient certificateless key exchange protocol for heterogeneous networks in human‐centered IoT systems.

3. Machine learning‐based clustering protocols for Internet of Things networks: An overview.

4. L‐RUBI: An efficient load‐based resource utilization algorithm for bi‐partite scatternet in wireless personal area networks.

5. An efficient self‐deployment methodology for maximized coverage of mobile underwater sensor networks.

6. Exploiting trust, influence, and physical proximity for improving routing performance in vehicular ad hoc networks: The SCALE protocol.

7. Survey on energy efficient dynamic sink optimum routing for wireless sensor network and communication technologies.

8. QoS‐aware IoT networks and protocols: A comprehensive survey.

9. Energy efficient and effective node deployment for wireless sensor network.

10. Modeling and reliability verification of industrial control network protocol based on time state transition matrix.

11. An SDN‐based technique for reducing handoff times in WiFi networks.

12. RPCP‐MAC: Receiver preambling with channel polling MAC protocol for underwater wireless sensor networks.

13. Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks.

14. Cryptanalysis and improvement of 2 mutual authentication schemes for Session Initiation Protocol.

15. Label-QoS switching protocol for quality of service assurance in dynamic swarm robot local network.

16. An intelligent and knowledge-based overlapping clustering protocol for wireless sensor networks.

17. ACMHS: Efficient access control for mobile health care system.

18. A novel cross‐layer communication protocol for vehicular sensor networks.

19. A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks.

20. A novel and efficient lattice-based authenticated key exchange protocol in C-K model.

21. Cryptanalysis of an identity-based authenticated key exchange protocol.

22. Formal verification of a radio network random access protocol.

23. An ECC-based authenticated group key exchange protocol in IBE framework.

24. Beacon-based routing protocols for underwater acoustic sensor networks.

25. Secure wireless powered relaying networks: Energy harvesting policies and performance analysis.

26. An efficient EAP-based proxy signature handover authentication scheme for WRANs over TV white space.

27. Time-assisted authentication protocol.

28. A robust ElGamal-based password-authentication protocol using smart card for client-server communication.

29. Improved multicast routing in MANETs using link stability and route stability.

30. Efficient medium access protocol for Internet of things applications.

31. A survey of cross-layer protocols for IEEE 802.11 wireless multi-hop mesh networks.

32. An improved password-based authentication scheme for session initiation protocol using smart cards without verification table.

33. Cryptanalysis and improvement of a three-party password-based authenticated key exchange protocol with user anonymity using extended chaotic maps.

34. Two-factor authentication scheme using attribute and password.

35. Provably secure and pairing-free identity-based handover authentication protocol for wireless mobile networks.

36. ATMAC: adaptive token-based medium access control protocol for cognitive radio wireless mesh network.

37. Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G.

38. Blind carrier frequency offset mitigation in space–time block‐coded multicarrier code division multiple access uplink transmission.

39. Efficient detection of missing tags for passive RFID systems.

40. IAMMAC: an interference-aware multichannel MAC protocol for wireless sensor-actor networks.

41. Integrated service discovery architecture for heterogeneous networks.

42. Cryptanalysis and improvement of an efficient authenticated key exchange protocol with tight security reduction.

43. Modified quantum superdense coding for distributed communications.

44. Performance analysis of hop-limited epidemic routing in DTN with limited forwarding times.

45. A non-repudiable negotiation protocol for security service level agreements.

46. Efficient multi-hop wireless broadcast protocol in vehicular networks using automated threshold function design.

47. Multi-topology routing based egress selection approach to achieve hybrid intra-AS and inter-AS traffic engineering.

48. Data traffic-based analysis of delay and energy consumption in cognitive radio networks with and without resource reservation.

49. Performance improvements of HCCA scheduling in V2R environments.

50. An improved anti-collision protocol for radio frequency identification tag.

Catalog

Books, media, physical & digital resources