default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 82 matches
- 2012
- Shaikh Mohammed Atiq, Dayanand Ingle, B. B. Meshram:
Web Mining and Security in E-commerce. ACITY (1) 2012: 477-487 - Durgesh Bajpai, Manu Vardhan, Sachin Gupta, Ravinder Kumar, Dharmender Singh Kushwaha:
Security Service Level Agreements Based Authentication and Authorization Model for Accessing Cloud Services. ACITY (1) 2012: 719-728 - Soma Bandyopadhyay, Abhijan Bhattacharyya:
Generic Middleware Architecture Supporting Heterogeneous Sensors Management for Any Smart System. ACITY (1) 2012: 395-404 - Rajesh P. Barnwal, Arnab Thakur:
Performance Analysis of AODV and DSDV Protocols Using RPGM Model for Application in Co-operative Ad-Hoc Mobile Robots. ACITY (1) 2012: 641-649 - Swathi Bhumireddy, Somanath Tripathy, Rakesh Matam:
Secure Peer-Link Establishment in Wireless Mesh Networks. ACITY (1) 2012: 189-198 - Suparna Biswas, Sarmistha Neogy:
Checkpointing and Recovery Using Node Mobility among Clusters in Mobile Ad Hoc Network. ACITY (1) 2012: 447-456 - Dipayan Bose, Arnab Banerjee, Aniruddha Bhattacharyya, Himadri Nath Saha, Debika Bhattacharyya, Pranab Kumar Banerjee:
An Efficient Approach to Secure Routing in MANET. ACITY (1) 2012: 765-776 - D. Chandramohan, T. Vengattaraman, M. S. Saleem Basha, P. Dhavachelvan:
MSRCC - Mitigation of Security Risks in Cloud Computing. ACITY (1) 2012: 525-532 - D. Chandramohan, Duggineni Veeraiah, M. Shanmugam, N. Balaji, G. Sambasivam, Shailesh Khapre:
SVIP-Enhanced Security Mechanism for SIP Based VoIP Systems and Its Issues. ACITY (1) 2012: 81-86 - Payal Chaudhari, Hiteishi M. Diwanji:
Enhanced SAFER+ Algorithm for Bluetooth to Withstand Against Key Pairing Attack. ACITY (1) 2012: 651-660 - Ramanuj Chouksey, R. Sivashankari, Piyush Singhai:
ECDLP Based Proxy Multi-signature Scheme. ACITY (1) 2012: 71-79 - Ayan Kumar Das, Rituparna Chaki:
MERCC: Multiple Events Routing with Congestion Control for WSN. ACITY (1) 2012: 691-698 - Priyanka Dey, Suparna Biswas:
Low Overhead Handoff Based Secure Checkpointing for Mobile Hosts. ACITY (1) 2012: 103-112 - Kirti Dhwaj, Rachit Garg, Gaurav Mishra, Neetesh Purohit:
Design and Analysis of Dual Capacitively Loaded C-PIFA. ACITY (1) 2012: 543-550 - Chaitali Biswas Dutta, Utpal Biswas:
Specification Based IDS for Power Enhancement Related Vulnerabilities in AODV. ACITY (1) 2012: 209-218 - Subrata Dutta, Nandini Mukherjee, Monideepa Roy, Sarmistha Neogy:
Efficient Path Selection to Propagate Data Message for Optimizing the Energy Dissipation in WSN. ACITY (1) 2012: 671-683 - O. S. GnanaPrakasi, P. Varalakshmi:
Improving TCP Performance in Hybrid Networks. ACITY (1) 2012: 405-415 - Nishant Goswami, Tarulata Chauhan, Nishant Doshi:
Efficient Cryptography Technique on Perturbed Data in Distributed Environment. ACITY (1) 2012: 239-244 - Mayank Kumar Goyal, Alok Aggarwal:
Composing Signatures for Misuse Intrusion Detection System Using Genetic Algorithm in an Offline Environment. ACITY (1) 2012: 151-157 - Mayank Kumar Goyal, Yatendra Kumar Verma, Paras Bassi, Paurush Kumar Misra:
Performance Analysis of TCP & UDP in Co-located Variable Bandwidth Environment Sharing Same Transmission Links. ACITY (1) 2012: 299-306 - L. K. Joshila Grace, V. Maheswari, Dhinaharan Nagamalai:
Personalised High Quality Search with in a Web Site: No User Profiling. ACITY (1) 2012: 307-316 - Paras Gupta, Manu Vardhan, Akhil Goel, Abhinav Verma, Dharmender Singh Kushwaha:
On the Fly File Dereplication Mechanism. ACITY (1) 2012: 709-718 - Nur Al Hasan Haldar, Muhammad Abulaish, Syed Asim Pasha:
A Statistical Pattern Mining Approach for Identifying Wireless Network Intruders. ACITY (1) 2012: 131-140 - Srimanta Halder, Monomita Mazumdar, Prasenjit Chanak, Indrajit Banerjee:
FTLBS: Fault Tolerant Load Balancing Scheme in Wireless Sensor Network. ACITY (1) 2012: 621-631 - Hemant Hariyale, Manu Vardhan, Ankit Pandey, Ankit Mishra, Dharmender Singh Kushwaha:
Load Balancing in Cluster Using BLCR Checkpoint/Restart. ACITY (1) 2012: 729-737 - Swarnali Hazra, S. K. Setua:
Trust Oriented Secured AODV Routing Protocol against Rushing Attack. ACITY (1) 2012: 777-788 - Preetha Theresa Joy, K. Poulose Jacob:
A Comparative Study of Cache Replacement Policies in Wireless Mobile Networks. ACITY (1) 2012: 609-619 - J. Julia, Meenakshi Murugappan:
Performance Improvement in MIMO Systems Using Rotating Codebooks. ACITY (1) 2012: 489-496 - Jagadeesh Kakarla, S. Siva Sathya:
Route and Load Aware Channel Assignment Algorithm for Multichannel and Multi Radio Vehicular Ad-Hoc Networks. ACITY (1) 2012: 289-298 - Manjusha Karkhanis, Achala Deshmukh:
Analysis of MIMO Channel Characteristics in Indoor Environment Using Ray Tracing Simulator. ACITY (1) 2012: 375-383
skipping 52 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-21 02:48 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint