default search action
International Journal of Internet Protocol Technology, Volume 8
Volume 8, Number 1, 2014
- Anirban Kundu, Lin Luan, Ruopeng Liu:
Synchronisation of data transfer in cloud. 1-24 - Hao-Li Wang, Rong-Guei Tsai, Ray Yueh-Min Huang:
Enhanced quality of service control scheme with high availability for self-optimising wireless sensor network. 25-32 - Jifeng Liao, Xiaodong Yang:
A handover algorithm in the converged networks of CMMB and TD-MBMS. 33-43 - Behzad Akbari, Hamid Reza Rabiee, Mohammed Ghanbari:
Performance analysis of packet loss recovery policies in P2P video streaming. 44-53
Volume 8, Numbers 2/3, 2014
- Hicham El Khoury, Romain Laborde, François Barrère, Abdelmalek Benzekri, Maroun Chamoun:
A data flow-oriented specification method for analysing network security configurations. 58-76 - Mohammed A. Ambusaidi, Zhiyuan Tan, Xiangjian He, Priyadarsi Nanda, Liang Fu Lu, Aruna Jamdagni:
Intrusion detection method based on nonlinear correlation measure. 77-86 - Xiaoping Lou, Jun Dai, Zhigang Chen, Moon Ho Lee:
An efficient quantum anonymous communication with hybrid entanglement swapping. 87-95 - Yang Lu, Jiguo Li:
Efficient constructions of certificate-based key encapsulation mechanism. 96-106 - Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:
Efficient identity-based threshold signature scheme from bilinear pairings in standard model. 107-115 - Li Zhang, Ying Guo, Dazu Huang:
High-efficient quantum secret sharing with arrangements of lines on two-dimensional planes. 116-121 - Wei Ren, Jiahua Lin, Qiang Cao, Liangli Ma:
LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing. 122-129 - Wei Yang, Yong-peng Gao, Zhiliang Zhu, Guiran Chang, Yu Yao:
Modelling, analysis and containment of passive worms in P2P networks. 130-142 - Jinjing Shi, Ronghua Shi, Yin Li, Ye Kang, Xiaoqi Peng:
Quantum states sharing in the relay system with teleportation of non-maximally entanglement. 143-149 - Yong Yan Chen, Hong Chun Shu:
The algorithm model for cumulative vulnerability risk assessment. 150-157
Volume 8, Number 4, 2014
- Utharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee:
Ticket model: a generalised model for internet-based three-party authorisation systems. 159-168 - Huixiang Zhang, Chunlei Chen, Hairui Zhou, Guanzhong Dai:
Max-min fair rate allocation for VCP in multi-bottleneck networks. 169-180 - Xiao Peng, Runtong Chen:
Energy-efficiency enhanced virtual machine deployment policy for data-intensive applications in cloud platforms. 181-189 - Benbin Chen, Donghui Guo:
Markov parameters tuning prediction to improve cache hit rate. 190-199 - Vaibhav Soni, Dheeresh Kumar Mallick:
Location-based routing protocols in wireless sensor networks: a survey. 200-213
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.