![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
International Journal of Business Data Communications and Networking, Volume 12
Volume 12, Number 1, 2016
- A. Narayana Rao
, Ch. D. V. Subba Rao:
QoS-Aware Service Selection and Multicast Framework for Wireless Mesh Networks. 1-15 - Nassima Bouadem, Rahim Kacimi, Abdelkamel Tari:
Impact of Duty-Cycling: Towards Mostly-Off Sensor Networks. 16-35 - Wael Alzaid, Biju Issac
:
Analysis of IPv6 through Implementation of Transition Technologies and Security Attacks. 36-62
Volume 12, Number 2, 2016
- Gianpaolo Tomaselli
, Monia Melia
, Lalit Garg
, Vipul Gupta, Peter Xuereb, Sandra Buttigieg
:
Digital and Traditional Tools for Communicating Corporate Social Responsibility: A Literature Review. 1-15 - Rakhee
, M. B. Srinivas:
A Soft Computing Approach for Data Routing in Hospital Area Networks (HAN). 16-27 - Prajnamaya Dass, Pranay Kumar Saha
, Hari Om:
Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks. 28-61 - Preeti Chandrakar, Hari Om:
A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme. 62-79 - Rahul Sharma, Nitesh Kumar Agrawal, Ayush Khare, Arup Kumar Pal
:
An Improved Size Invariant (n, n) Extended Visual Cryptography Scheme. 80-88 - Amit Kumar, Hari Om:
Lightweight, ECC based RFID Authentication Scheme for WLAN. 89-103
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.