default search action
International Journal of Ad Hoc and Ubiquitous Computing, Volume 34
Volume 34, Number 1, 2020
- Ch. Koteswara Rao, Kunwar Singh:
Securely solving privacy preserving minimum spanning tree algorithms in semi-honest model. 1-10 - Chih-Shun Hsu:
Refining channel and power allocation for green device-to-device communications. 11-24 - Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi:
ECG patch monitor: a telemedicine system for remote monitoring and assisting patients during a heart attack. 25-34 - Saeid Afshari, Mohammad Nassiri, Reza Mohammadi:
SA-RPL: a scheduling-aware forwarding mechanism in RPL/TSCH-operated networks. 35-44 - Vinod Kumar Mahor, R. Padmavathi, Santanu Chatterjee, Sanshray Kumar Dewangan, Manish Kumar:
A secure three factor-based fully anonymous user authentication protocol for multi-server environment. 45-60
Volume 34, Number 2, 2020
- Tsozen Yeh, Yipin Wang, Yiming Tu:
Maintaining data integrity in cloud systems through version management. 63-73 - Shin-Hung Chang, Kuan-Jen Wang, Jan-Ming Ho:
An optimal scheduling algorithm for DASH video streaming over variable bit rate networks. 74-91 - Zhenyu He:
Personalised gesture recognition based on tri-axis accelerometer using Gabor filters. 92-101 - Yu-Chi Chen:
Plaintext checkable encryption with check delegation revisited. 102-110 - Chih-Chieh Hung, Ying-Ju Chen, Siou-Jhih Guo, Fu-Chun Hsu:
Predicting the price movement from candlestick charts: a CNN-based approach. 111-120 - Meng-Hsuan Fu:
Health-Ledger model development based on IoT and blockchain. 121-127
Volume 34, Number 3, 2020
- Ashok Kumar, Anju Sharma, Rajesh Kumar:
A swarm intelligence-based quality of service aware resource allocation for clouds. 129-140 - Songyun Wang, Jiabin Yuan, Xiaoda Zhang, Zhuzhong Qian, Xin Li, Ilsun You:
QoS-aware flow scheduling for energy-efficient cloud data centre network. 141-153 - O. S. Jannath Nisha, S. Mary Saira Bhanu:
Detection of malware applications using social spider algorithm in mobile cloud computing environment. 154-169 - Shahab Haider, Ghulam Abbas, Ziaul Haq Abbas, Fazal Muhammad:
LWE-CPPA: a scheme for secure delivery of warning messages in VANETs. 170-185 - Kuo-Chang Ting, Jung-Shyr Wu, Chih-Cheng Tseng:
LTE-indoor: a novel PHY layer design for future 5G indoor femtocell networks. 186-197
Volume 34, Number 4, 2020
- Tin-Yu Wu, Yu-Wei Wu:
An energy-efficient low-SAR pathfinding mechanism for WBAN. 199-207 - Lunzhi Deng:
An improved certificateless two-party authenticated key agreement protocol for wireless sensor networks. 208-215 - J. Sathish Kumar, Saurabh Kumar, Meghavi Choksi, Mukesh A. Zaveri:
Collaborative data acquisition and processing for post disaster management and surveillance related tasks using UAV-based IoT cloud. 216-232 - You-Chiun Wang, Shih-Wei Yeh:
E-DSR: energy-efficient routing for sensors with diverse sensing rates. 233-248 - Runzhi Zeng, Libin Wang:
Cryptanalysis of certificateless authenticated key agreement protocols. 249-257
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.