default search action
NaNA 2017: Kathmandu City, Nepal
- International Conference on Networking and Network Applications, NaNA 2017, Kathmandu City, Nepal, October 16-19, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-0604-9
- Lei Zhu, Yanxiao Liu, Yichuan Wang, Wenjiang Ji, Xinhong Hei, Quanzhu Yao, Xiaoyan Zhu:
Efficient (k, n) Secret Sharing Scheme Secure against k - 2 Cheaters. 1-4 - Teng Li, Jianfeng Ma, Cong Sun, Dawei Wei, Ning Xi:
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. 5-10 - Yinghui Zhang, Dong Zheng, Qinglan Zhao, Chengzhe Lai, Fang Ren:
PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice. 11-16 - Haokai Song, Qingqi Pei, Yang Xiao, Zi Li, Yong Wang:
A Novel Recommendation Model Based on Trust Relations and Item Ratings in Social Networks. 17-23 - Jing Hu, Wuchao Shi, Hai Liu, Jun Yan, Yuan Tian, Zhenqiang Wu:
Preserving Friendly-Correlations in Uncertain Graphs Using Differential Privacy. 24-29 - Yongchao Dang, Yin Chen, Huihui Wu, Yulong Shen, Xiaohong Jiang:
Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources. 30-35 - Rentao Gu, Shizong Zhang, Zidi Yan, Yuefeng Ji:
Efficient ONU Migration for Fixed and Mobile Convergence Network in High-Speed Rail Area. 36-41 - Huihui Wu, Xuening Liao, Yongchao Dang, Yulong Shen, Xiaohong Jiang:
Limits of Covert Communication on Two-Hop AWGN Channels. 42-47 - Jiao Quan, Xiaochen Li, Yeqiu Xiao, Yulong Shen, Fenghua Li:
Secure Transmission with Limited Feedback in MISOME Wiretap Channels. 48-53 - Shikai Shen, Kaiguo Qian, Bin Yang, Yumei She, Wu Wang, Yujian Wang:
An Improved Amorphous Algorithm in Wireless Sensor Network Based on Approximate Equilateral Triangle Beacon Selection. 54-60 - Feng Tian, Shuangyue Zhang, Laifeng Lu, Hai Liu, Xiaolin Gui:
A Novel Personalized Differential Privacy Mechanism for Trajectory Data Publication. 61-68 - Hao Hao, Changqiao Xu, Shujie Yang, Jianfeng Guan, Yang Liu, Lujie Zhong:
BF-PDT: A New Name Lookup Mechanism in Content-Centric Networking. 69-74 - Mohamed Ben Zeglam, Pin-Han Ho, Limei Peng, Shuiping Jie:
A Novel Scheme for Phase Noise Compensation in CO-OFDM Long-Reach Passive Optical Networks. 75-79 - Jia Liu, Yang Xu, Ruo Ando, Hiroki Takakura, Yifei Xu:
Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc Networks. 80-86 - Yang Xu, Jia Liu, Ruo Ando, Norio Shiratori:
End-to-End Congestion Relief Routing Protocol for Ad Hoc Networks. 87-92 - Yanping Li, Yanjiao Qi, Laifeng Lu:
Secure and Efficient V2V Communications for Heterogeneous Vehicle Ad Hoc Networks. 93-99 - Bin Yang, Zhenqiang Wu, Yulong Shen, Yuanyuan Fan:
Multicast Delivery Delay in General Two-Hop Relay MANETs. 100-103 - Jianming Fu, Mengfei Xie, Yingjun Wang, Xufen Mei:
An Empirical Study of Unsolicited Content Injection into a Website. 104-111 - Runcong Ma, Gwo-Jong Yu, Guilin Chen, Shenghui Zhao, Bin Yang:
Hierarchical CSI-fingerprints Classification for Passive Multi-person Localization. 112-117 - Jun Liu, Zhiwei Li, Boyan Ding, Haoyang Wu, Tao Wang:
A Flexible Frame-Oriented Host-FPGA Communication Framework for Software Defined Wireless Network. 118-124 - Hai Liu, Zhenqiang Wu, Changgen Peng, Xiujuan Lei:
Genomic Privacy Preserving Framework for High-Order SNPs Linkage Disequilibrium on Correlated Sequences. 125-132 - Khem Narayan Poudel, Shankar Gangaju:
Spectral Efficiency, Diversity Gain and Multiplexing Capacity Analysis for Massive MIMO, 5G Communications System. 133-137 - Kappala Vinod Kiran, Shikha Rathore, Ashok Kumar Turuk, Santos Kumar Das:
Development of a Hybrid FSO/RF System during Link Misalignment. 138-140 - G. S. R. Satyanarayana, Debarka Chakraborty, Santos Kumar Das:
Application Oriented Sensor Database System. 141-146 - Wuchao Shi, Jing Hu, Jun Yan, Zhenqiang Wu, Laifeng Lu:
A Privacy Measurement Method Using Network Structure Entropy. 147-151 - Xinlei Wang, Zhenqiang Wu, Jiawang Chen, Xuanwen Hao, Bo Liu:
Reliability Analysis of Molecular Communication Based on Drift Diffusion. 152-157 - Shuangyuan Qiao, Yong Zeng, Lingjie Zhou, Zhihong Liu, Jianfeng Ma:
A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence. 158-163 - Wu Wang, Bin Yang, Shikai Shen, Yujian Wang, Gang Fang:
Delay and Capacity in Three-Dimensional Mobile Ad Hoc Networks with Packet Replication. 164-169 - Zhengqi Wang, Xiaobing Feng, Yukun Niu, Chi Zhang, Jue Su:
TSMWD: A High-Speed Malicious Web Page Detection System Based on Two-Step Classifiers. 170-175 - Jingcheng Miao, Xiao Ou Song:
An Enhanced Soft Combination Algorithm Based on CUSUM for Cooperative Spectrum Sensing. 176-179 - Sujeet Kumar Jha, Rupa Rokaya, Amit Bhagat, Ahmed Raja Khan, Laxman Aryal:
LTE Network: Coverage and Capacity Planning - 4G Cellular Network Planning around Banepa. 180-185 - Rahul Kumar Sah, Sushant Ghising, Saurab Dulal, Manish Karn, Suresh Sah:
Wireless Monitoring of Photovoltaics Panels. 186-189 - Jun Yan, Lin Zhang, Wuchao Shi, Jing Hu, Zhenqiang Wu:
Uncertain Graph Method Based on Triadic Closure Improving Privacy Preserving in Social Network. 190-195 - Mu Yan, Yatong Wang, Su Wu, Gang Feng, Shuang Qin:
An 802.11 MAC Optimization Mechanism Based on Throughput Proportional Fairness in Multi-rate WLAN. 196-202 - Zhao Huang, Quan Wang:
MSIPS: Multi-tiered Security IPs Architecture for Secure SoC Design. 203-208 - Guojun Ma, Xing Li, Qingqi Pei, Zi Li:
A Security Routing Protocol for Internet of Things Based on RPL. 209-213 - Zhan Shi, Chenyue Wang, Qili Wen, Wei Su, Huachun Zhou, Shuai Gao:
A Transmission Mechanism of the Backup for Disaster Recovery in DCNs. 214-219 - Xiaowu Du, Lisheng Ma:
Backup Path Provisioning for Service Protection against Disaster Failures in Telecom Networks. 220-224 - Xiang Ji, Qingyi Hua, Chunyu Li, Junsong Tang, Anwen Wang, Xiaojiang Chen, Dingyi Fang:
2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster Rescue. 225-231 - Tao Zhang, Yongzhi Wang, Guangxia Li, Jingjing Guo, Qi Li:
Reputation Propagation for Web Service Composition: A Shapley Value Approach. 232-238 - Long-Hai Li, Cheng-Qiang Huang, Shao-Feng Fu:
A CCA-secure Verifiable Mix-Net. 239-245 - Yajing Zhao, Jing Wang, Lei Zhang, Jingyu Wang, Qi Qi:
Performance Evaluation and Optimization for Android-Based Web Server. 246-251 - Mengjie Liu, Yatong Wang, Jiang Zhou, Gang Feng, Shuang Qin:
Joint Resource Scheduling for Mobile Multimedia Services in Hierarchical Cloud Networks. 252-257 - Yiming Guo, Yulong Wang, Lei Zhang, Jingyu Wang, Qi Qi:
GA-based Load Balancing Algorithm for Distributed Timing Task. 258-262 - Yuyan Zhao, Haibao Chen, Shenghui Zhao, Yihong Wang:
The Storage of Virtual Machine Disk Image in Cloud Computing: A Survey. 263-267 - Siqie Zhang, Changle Li, Xun Zhou:
A Novel Approach for Mining Road Information from Low Precision GPS Data. 268-273 - Xiaoci Zhang, Naijie Gu, Robail Yasrab, Hong Ye:
GT-SGD: A Novel Gradient Synchronization Algorithm in Training Distributed Recurrent Neural Network Language Models. 274-278 - You Zhai, Guangquan Xu, Yao Zhang:
A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr Signature. 279-285 - Ning Xi, Cong Sun, Di Lu, Yulong Shen:
Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds. 286-291 - Hui Gao, Yulong Shen, Bin Yang:
D2D Communication for Disaster Recovery in Cellular Networks. 292-295 - Pratima Pradhan, Subarna Shakya:
Big Data Application for Nepalese Government: A Proposed Solution for Labor Migrant. 296-302 - Yongzhi Wang, Lingtong Liu, Cuicui Su, Jiawen Ma, Lei Wang, Yibo Yang, Yulong Shen, Guangxia Li, Tao Zhang, Xuewen Dong:
CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX. 303-308 - Xiaolan Liu, Bin Yang, Xiaohong Jiang:
Trust-Aware Data Uploading Based on Device-to-Device Communications. 309-313 - Omran Ayoub, Francesco Musumeci, Massimo Tornatore, Achille Pattavina:
Techno-Economic Evaluation of CDN Deployments in Metropolitan Area Networks. 314-319 - Kai Gao, Changqiao Xu, Jianfeng Guan, Yang Liu:
A Survey of Multipath Transport Mechanism in Software Defined Network. 320-325 - Ahmed Salem, Xuening Liao, Yulong Shen, Xiang Lu:
Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework. 326-329 - Bishnu Prasad Gautam, Amit Batajoo, Hiroyasu Asami:
Cost Effective Accommodation Planning in a Trip by Using Accommodation Advisor Query (AA-Query) in STPF. 330-336 - Anku Jaiswal, Purrushottam Bagale:
A Survey on Big Data in Financial Sector. 337-340 - Ziyi Han, Li Yang, Qiang Liu:
A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing. 341-346 - Jingjing Hu, Yancheng Ji, Junma Li, Danfeng Dong:
Research on Power Allocation of Network Coding in Vehicle Networking. 347-352
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.