Search

Your search keyword '"COMPUTER network protocols"' showing total 205 results

Search Constraints

Start Over You searched for: Descriptor "COMPUTER network protocols" Remove constraint Descriptor: "COMPUTER network protocols" Search Limiters Full Text Remove constraint Search Limiters: Full Text Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Publisher springer nature Remove constraint Publisher: springer nature
205 results on '"COMPUTER network protocols"'

Search Results

1. Correlation-based advanced feature analysis for wireless sensor networks.

2. UPSRVNet: Ultralightweight, Privacy preserved, and Secure RFID-based authentication protocol for VIoT Networks.

3. Discovering golden ratio in the world's first five-agent network in ancient China.

4. Privacy-preserving routing using jointly established protocol in IoT network environment.

5. A Q-learning-based distributed queuing Mac protocol for Internet-of-Things networks.

6. An adaptive centralized authentication control method to reduce association delay in the IoT 802.11ah protocol.

7. Trusted consensus protocol for blockchain networks based on fuzzy inference system.

8. A lightweight authentication and key agreement protocol for heterogeneous IoT with special attention to sensing devices and gateway.

9. Independent spanning trees on WK-recursive networks and WK-recursive pyramids.

10. Chain and silk: alternative futures of blockchain governance in Kyrgyzstan.

11. Benchmarking of quantum protocols.

12. Performance evaluation and comparison study of adaptive MANET service location and discovery protocols for highly dynamic environments.

13. An efficient simulation for quantum secure multiparty computation.

14. Time-critical energy minimization protocol using PQM (TCEM-PQM) for wireless body sensor network.

15. Enhanced lifetime of heterogeneous wireless sensor network using stable election protocol with region-based energy-conscious sink movement.

16. Area double cluster head APTEEN routing protocol-based particle swarm optimization for wireless sensor networks.

17. Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks.

18. An improved content-based outlier detection method for ICS intrusion detection.

19. Parameterized synthesis of self-stabilizing protocols in symmetric networks.

20. Big Data Processing using Internet of Software Defined Things in Smart Cities.

21. The energy-efficient MDA-SMAC protocol for wireless sensor networks.

22. CDABC: chaotic discrete artificial bee colony algorithm for multi-level clustering in large-scale WSNs.

23. Multi-level clustering protocol for load-balanced and scalable clustering in large-scale wireless sensor networks.

24. Light-traffic analysis of random access systems without collisions.

25. MOSAIC: A Scalable Coherence Protocol.

26. Clustering algorithm for internet of vehicles (IoV) based on dragonfly optimizer (CAVDO).

27. Field classification-based novel fuzzing case generation for ICS protocols.

28. A secure ECC-based RFID mutual authentication protocol for internet of things.

29. The intelligent IoT common service platform architecture and service implementation.

30. An automatic RFID reader-to-reader delegation protocol for SCM in cloud computing environment.

31. Self-adaptive risk-aware routing in opportunistic network.

32. Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag.

33. An election protocol based on group membership detection algorithm in mobile ad hoc distributed systems.

34. A key agreement authentication protocol using an improved parallel Pollard rho for electronic payment system.

35. An efficient anonymous authentication protocol in multiple server communication networks (EAAM).

36. Efficient design and hardware implementation of the OpenFlow v1.3 Switch on the Virtex-6 FPGA ML605.

37. Secure vehicle traffic data dissemination and analysis protocol in vehicular cloud computing.

38. Performance analysis of feedback-free collision resolution NDMA protocol.

39. A hybrid MAC protocol for optimal channel allocation in large-scale wireless powered communication networks.

40. On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags.

41. A Scalable and Lightweight Grouping Proof Protocol for Internet of Things Applications.

42. DoS, impersonation and de-synchronization attacks against an ultra-lightweight RFID mutual authentication protocol for IoT.

43. DAWA: Defending against wormhole attack in MANETs by using fuzzy logic and artificial immune system.

44. To be silent or not: on the impact of evictions of clean data in cache-coherent multicores.

45. A correct-by-construction model for asynchronously communicating systems.

46. Adaptive video streaming over HTTP through 4G wireless networks based on buffer analysis.

47. Delay analysis and optimality of the renewal access protocol.

48. Verification of population protocols.

49. Adaptive couple-resolution blocking protocol for repeated tag identification in RFID systems.

50. An open-source family of tools to reproduce MPI-based workloads in interconnection network simulators.

Catalog

Books, media, physical & digital resources