Works matching IS 18951767 AND DT 2019 AND VI 20 AND IP 1
Results: 13
AN EFFICIENT ZERO-KNOWLEDGE PROOF BASED IDENTIFICATION SCHEME FOR SECURING SOFTWARE DEFINED NETWORK.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 181, doi. 10.12694/scpe.v20i1.1473
- By:
- Publication type:
- Article
A SECURE STRUCTURE FOR HIDING INFORMATION IN A CRYPTOSYSTEM BASED ON MACHINE-LEARNING TECHNIQUES AND CONTENT-BASED OPTIMIZATION USING PORTFOLIO SELECTION DATA.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 161, doi. 10.12694/scpe.v20i1.1488
- By:
- Publication type:
- Article
A DETAILED DESCRIPTION ON UNSUPERVISED HETEROGENEOUS ANOMALY BASED INTRUSION DETECTION FRAMEWORK.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 113, doi. 10.12694/scpe.v20i1.1465
- By:
- Publication type:
- Article
A PATTERN-BASED MULTI-FACTOR AUTHENTICATION SYSTEM.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 101, doi. 10.12694/scpe.v20i1.1460
- By:
- Publication type:
- Article
ON THE SECURITY OF AUTHENTICATED GROUP KEY AGREEMENT PROTOCOLS.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 93, doi. 10.12694/scpe.v20i1.1440
- By:
- Publication type:
- Article
NODE AUTHENTICATION USING NTRU ALGORITHM IN OPPORTUNISTIC NETWORK.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 83, doi. 10.12694/scpe.v20i1.1481
- By:
- Publication type:
- Article
A PARTICLE SWARM OPTIMIZATION BASED LOAD SCHEDULING ALGORITHM IN CLOUD PLATFORM FOR WIRELESS SENSOR NETWORKS.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 71, doi. 10.12694/scpe.v20i1.1464
- By:
- Publication type:
- Article
ZONE-BASED ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 55, doi. 10.12694/scpe.v20i1.1432
- By:
- Publication type:
- Article
ENHANCED CLUSTERING ALGORITHM BASED ON FUZZY LOGIC (E-CAFL) FOR WSN.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 41, doi. 10.12694/scpe.v20i1.1443
- By:
- Publication type:
- Article
ESTABLISHING RELIABILITY FOR EFFICIENT ROUTING IN OPPORTUNISTIC NETWORKS.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 27, doi. 10.12694/scpe.v20i1.1479
- By:
- Publication type:
- Article
ANALYSIS OF DELAY-TOLERANT ROUTING PROTOCOLS USING THE IMPACT OF MOBILITY MODELS.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 17, doi. 10.12694/scpe.v20i1.1450
- By:
- Publication type:
- Article
BONDING BASED TECHNIQUE FOR MESSAGE FORWARDING IN SOCIAL OPPORTUNISTIC NETWORK.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. 1, doi. 10.12694/scpe.v20i1.1469
- By:
- Publication type:
- Article
INTRODUCTION TO THE SPECIAL ISSUE ON OPPORTUNISTIC NETWORK AND ITS SECURITY CHALLENGES.
- Published in:
- Scalable Computing: Practice & Experience, 2019, v. 20, n. 1, p. iii, doi. 10.12694/scpe.v20i1.1519
- By:
- Publication type:
- Article