default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 45 matches
- 2019
- Reham Abdellatif Abouhogail:
A New Secure Lightweight Authentication Protocol for NFC mobile Payment. Int. J. Commun. Networks Inf. Secur. 11(2) (2019) - Ali M. A. Abuagoub:
IoT Security Evolution: Challenges and Countermeasures Review. Int. J. Commun. Networks Inf. Secur. 11(3) (2019) - Alaa Al-Nusirat, Feras Hanandeh, Mohammad Kamel Kharabsheh, Mahmoud Al-Ayyoub, Nahla Al-dhfairi:
Dynamic Detection of Software Defects Using Supervised Learning Techniques. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang:
Efficient and Secure ECDSA Algorithm and its Applications: A Survey. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Felomino Porras Alba, Enrique D. Festijo, Ruji P. Medina:
A Distance-Based Data-Mule Scheduling Technique for Lesser Nodal Delay in Wireless Sensor Network. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Rafat Ahmed Alhanani, Jaafar Abouchabaka, Najat Rafalia:
CDS-MIP: CDS-based Multiple Itineraries Planning for mobile agents in wireless sensor network. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - May A. Alotaibi, Mohammed A. Alzain, Ben Soh, Mehedi Masud, Jehad F. Al-Amri:
Computer Forensics: Dark Net Forensic Framework and Tools Used for Digital Evidence Detection. Int. J. Commun. Networks Inf. Secur. 11(3) (2019) - Khalid Saleh Aloufi:
6LoWPAN Stack Model Configuration for IoT Streaming Data Transmission over CoAP. Int. J. Commun. Networks Inf. Secur. 11(2) (2019) - Mohammed Alsaedi:
Image Encryption and Decryption Using Chua's Circuits. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Amiruddin Amiruddin, Anak Agung Putri Ratna, Riri Fitri Sari:
Systematic Review of Internet of Things Security. Int. J. Commun. Networks Inf. Secur. 11(2) (2019) - A. Basnet, Abeer Alsadoon, P. W. C. Prasad, Omar Hisham Alsadoon, Linh Pham, Amr Elchouemi:
A Novel Secure Patient Data Transmission through Wireless Body Area Network: Health Tele-Monitoring. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Karim Benzidane, Saad Khoudali, Leila Fetjah, Said Jai-Andaloussi, Abderrahim Sekkaki:
Application-based authentication on an inter-VM traffic in a Cloud environment. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Priyang Prakashchandra Bhatt, Bhaskar V. Thakker:
Mass Removal of Botnet Attacks Using Heterogeneous Ensemble Stacking PROSIMA classifier in IoT. Int. J. Commun. Networks Inf. Secur. 11(3) (2019) - Saufi Bukhari, Ku Ruhana Ku-Mahamud, Hiroaki Morino:
Load Balancing Using Dynamic Ant Colony System Based Fault Tolerance in Grid Computing. Int. J. Commun. Networks Inf. Secur. 11(2) (2019) - Bongisizwe Erasmus Buthelezi, Maredi Mphahlele, Deon Du Plessis, Solly Maswikaneng, Topside E. Mathonsi:
ZigBee Healthcare Monitoring System for Ambient Assisted Living Environments. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Zheng Wei Clement Chan, Chuah Chai Wen, Janaka Alawatugoda:
Review on Leakage Resilient Key Exchange Security Model. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Zouhair Chiba:
New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, Mohammed Rida:
Intelligent and Improved Self-Adaptive Anomaly based Intrusion Detection System for Networks. Int. J. Commun. Networks Inf. Secur. 11(2) (2019) - Febrian Wahyu Christanto, Susanto, Agus Priyanto:
LOAD BALANCING-FAILOVER METHODS USING STATIC ROUTE WITH ADDRESS LIST, ECMP, PCC, AND NTH FOR OPTIMIZING LAN NETWORK : A COMPARISON. Int. J. Commun. Networks Inf. Secur. 11(3) (2019) - Jhon Francined Herrera Cubides, Paulo Alonso Gaona-García, Carlos Enrique Montenegro-Marín, Diego Mauricio Cataño, Rubén González Crespo:
Security Aspects in Web of Data Based on Trust Principles. A brief of Literature Review. Int. J. Commun. Networks Inf. Secur. 11(3) (2019) - Nur Fasihah Mohd Esa, Shekh Faisal Abdul-Latip, Mohd Rizuan Baharon:
A Survey of ARX-based Symmetric-key Primitives. Int. J. Commun. Networks Inf. Secur. 11(3) (2019) - Mohamed El Ghazouani, Moulay Ahmed El Kiram, Latifa Er-Rajy:
Blockchain & Multi-Agent System: A New Promising Approach for Cloud Data Integrity Auditing with Deduplication. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Amjad Yosef Hendi, Majed O. Dwairi, Ziad Abdulkareem Al-Qadi, Mohamed S. Soliman:
A NOVEL SIMPLE AND HIGHLY SECURE METHOD FOR DATA ENCRYPTION-DECRYPTION. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Mohammad Equebal Hussain, Mohammed Qayyum, Mohammad Rashid Hussain, Rashid Hussain:
Effective and Secure vWSN Applications in a Virtualized Cloud Computing Environment. Int. J. Commun. Networks Inf. Secur. 11(2) (2019) - Ahmed Jedidi:
Workload Cluster Balance Algorithm to Improve Wireless Sensor Network Performance. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Rakesh K. Kadu, Dattatraya S. Adane:
Hardware Implementation of Efficient Elliptic Curve Scalar Multiplication using Vedic Multiplier. Int. J. Commun. Networks Inf. Secur. 11(2) (2019) - Dalveer Kaur, Neeraj Kumar:
Dexterity for Channel Capacity Enhancement in MU-MIMO by Abrogating Interference. Int. J. Commun. Networks Inf. Secur. 11(1) (2019) - Yassine El Khanboubi, Mostafa Hanoune:
Exploiting Blockchains to improve Data Upload and Storage in the Cloud. Int. J. Commun. Networks Inf. Secur. 11(3) (2019) - Salim El Khediri, Rehan Ullah Khan, Waleed Albattah:
An optimal clustering algorithm based distance-aware routing protocol for wireless sensor networks. Int. J. Commun. Networks Inf. Secur. 11(3) (2019) - Muni Lavanya, Chigarapalle Shoba Bindu, Vijay Kumar:
Internet Traffic based Channel Selection in Multi-Radio Multi-Channel Wireless Mesh Networks. Int. J. Commun. Networks Inf. Secur. 11(2) (2019)
skipping 15 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-21 18:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint