default search action
NSysS (2) 2017: Dhaka, Bangladesh
- 4th International Conference on Networking, Systems and Security, NSysS (2) 2017, Dhaka, Bangladesh, December 18-20, 2017. IEEE 2017, ISBN 978-1-5386-3288-8
- Md. Armanuzzaman, Kazi Md. Rokibul Alam, Md. Mehadi Hassan, Yasuhiko Morimoto:
A secure and efficient data transmission technique using quantum key distribution. 1-5 - Sharifa Tahmida Kaniz, Jibon Naher, Tanzima Hashem:
Authentication of k nearest neighbor queries in the presence of obstacles. 1-9 - Md. Adnanul Islam, A. B. M. Alim Al Islam, Md. Saidul Hoque Anik:
Polygot: An approach towards reliable translation by name identification and memory optimization using semantic analysis. 1-8 - Mohammad Sakib Mahmud, Mahbub Arab Majumder, Abdul Kawsar Tushar, Md. Mahtab Kamal, Akm Ashiquzzaman, Md. Rashedul Islam:
Real-time feedback-centric nurse calling system with archive monitoring using Raspberry Pi. 1-5 - Nashid Shahriar, Shihabur Rahman Chowdhury, Reaz Ahmed, Mahfuza Sharmin, Raouf Boutaba, Bertrand Mathieu:
Availability in P2P based online social networks. 1-9 - Md. Abdullah Al Fuad, Md. Safiullah Sarker Sabuj, Mohammed Zunaid Hasan, Mahmuda Naznin:
RLB: Randomized load balanced packet forwarding strategy in name based data networking. 1-4 - Md. Ahsan Habib, Mohammad S. Hasan:
A performance analysis of backbone structures for static sink based Starfish routing in WSN. 1-6 - Shantanu Dutta, Abdul Kawsar Tushar, Md. Abdullah Al Mamun, Alvi Md. Ishmam, Sourav Kumar Mondal, Tarik Reza Toha, A. B. M. Alim Al Islam:
Towards perceiving and resolving the impediments to reporting for the developing countries. 1-8 - Ananya Bhattacharjee, Tahrina Tasnim, Md. Sadiqur Rahman Sohel, Amit Chakraborty, Md. Abdullah Al Maruf, Shantanu Dutta, Alvi Md. Ishmam, Tarik Reza Toha, A. B. M. Alim Al Islam:
Service-Hub: A better approach for developing the system of online marketing for daily services. 1-5 - Tasnim Kabir, Muhammad Abdullah Adnan:
A dynamic searchable encryption scheme for secure cloud server operation reserving multi-keyword ranked search. 1-9 - Sanghita Bhattacharjee, Kavisha Agarwal:
Energy efficient multiple sink placement in wireless sensor networks. 1-7 - Md. Rafiul Biswas, Kazi Md. Rokibul Alam, Ali Akber, Yasuhiko Morimoto:
A DNA cryptographic technique based on dynamic DNA encoding and asymmetric cryptosystem. 1-8 - Tarik Reza Toha, Alvi Md. Ishmam, Md. Hasanul Islam, Md. Abdullah Al Maruf, Swarnendu Saikat Nandi, Amit Chakraborty, Salman Estyak, Md. Abdullah Al Alamin, A. B. M. Alim Al Islam:
An approach towards greening the digital display system. 1-6 - Sifat E. Jahan, Mehjabin Rahman, Anindya Iqbal, Tishna Sabrina:
An exploratory analysis of security on data transmission on relevant software engineering discussion sites. 1-9 - Fahim Shahriar, Aakib Bin Nesar, Naweed Mohammad Mahbub, Swakkhar Shatabda:
EGAGP: An enhanced genetic algorithm for producing efficient graph partitions. 1-9 - Ahamed Al Nahian, A. B. M. Alim Al Islam:
Efficient UAV deployment strategy for reconnaissance. 1-6 - Partha Chakraborty, Salsabil Arabi, Ayesha Siddiqua, Tahrina Tasnim, Md. Sazzad Hossain, Syed Ishtiaque Ahmed, Shantanu Dutta, Alvi Md. Ishmam, Tarik Reza Toha, A. B. M. Alim Al Islam:
Automated cost reduction while using multiple SIMs in a single mobile device. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.