• Daneshyari
  • Topics
    • Physical Sciences and Engineering
      Life Sciences
      Health Sciences
      Social Sciences and Humanities
Daneshyari Computer Networks and Communications Journas Latest Articles

Computer Networks and Communications Research Articles

A novel identity-based strong designated verifier signature scheme
Fulltext Access 4 Pages 2009
Mixed-mode universal filter using MCCCII
Fulltext Access 4 Pages 2009
Modification in microstrip low pass filter using bulb shape patch
Fulltext Access 4 Pages 2009
Radiation from charged moving periodic fiber
Fulltext Access 4 Pages 2009
An assessment of systems and software engineering scholars and institutions (2002–2006)
Fulltext Access 4 Pages 2009
More secure remote user authentication scheme
Fulltext Access 4 Pages 2009
An update to experimental models for validating computer technology
Fulltext Access 4 Pages 2009
Perfectly fair channel assignment in non-cooperative multi-radio multi-channel wireless networks
Fulltext Access 4 Pages 2009
Weaknesses and improvements of the Yoon–Ryu–Yoo remote user authentication scheme using smart cards
Fulltext Access 4 Pages 2009
Security flaw of Hölbl et al.’s protocol
Fulltext Access 4 Pages 2009
Mobile and wireless communications: Technologies, applications, business models and diffusion
Fulltext Access 4 Pages 2009
Combined switching and power control for diversity and multiplexing in MIMO systems with cochannel interference
Fulltext Access 4 Pages 2009
High noon for virtualisation
Fulltext Access 4 Pages 2009
Do it or pay
Fulltext Access 4 Pages 2009
Get ‘em young
Fulltext Access 4 Pages 2009
Why physicists choose infosec
Fulltext Access 4 Pages 2009
Nine lives
Fulltext Access 4 Pages 2009
Socially active
Fulltext Access 4 Pages 2009
Information security in China: A license to print money
Fulltext Access 4 Pages 2009
Fasten your seatbelts
Fulltext Access 4 Pages 2009
OHS: A Novel hybrid survivability approach for WDM mesh networks
Fulltext Access 4 Pages 2009
Throughput analysis of partial channel information proportional fairness scheduling
Fulltext Access 4 Pages 2009
Joint transceiver vector precoding based on GMD method for MIMO systems
Fulltext Access 4 Pages 2009
Joint blind estimation of symbol timing and carrier frequency offset for 2×22×2 MIMO-OFDM system based on cyclostationarity
Fulltext Access 4 Pages 2009
End of Volume Author Index
Fulltext Access 4 Pages 2009
Outage performance of STBC MB-OFDM UWB
Fulltext Access 4 Pages 2009
Energy-efficient relaying in wireless networks
Fulltext Access 4 Pages 2009
Bandgap determination of triangular lattice EBGs in the ground plane
Fulltext Access 4 Pages 2009
Reflections on privacy, identity and consent in on-line services
Fulltext Access 5 Pages 2009
Privacy and consent in pervasive networks
Fulltext Access 5 Pages 2009
Electronic passports – from secure specifications to secure implementations
Fulltext Access 5 Pages 2009
Design of DL-based certificateless digital signatures
Fulltext Access 5 Pages 2009
A novel access control protocol for secure sensor networks
Fulltext Access 5 Pages 2009
A safety approach to information security communications
Fulltext Access 5 Pages 2009
Information security management: An entangled research challenge
Fulltext Access 5 Pages 2009
The irreversible march of technology
Fulltext Access 5 Pages 2009
Operating regimes of an optical coupler combined fiber laser system
Fulltext Access 5 Pages 2009
Characteristics of cladding index modulated fiber gratings for ambient refractive index sensing
Fulltext Access 5 Pages 2009
Teleporter: An analytically and forensically sound duplicate transfer system
Fulltext Access 5 Pages 2009
Radio-on-hybrid WDM transport systems based on mutually injection-locked Fabry–Perot laser diodes
Fulltext Access 5 Pages 2009
Flattery will get you everywhere
Fulltext Access 5 Pages 2009
A newsworthy year
Fulltext Access 5 Pages 2009
Lessons not learned on data disposal
Fulltext Access 5 Pages 2009
An optical surveillance technique based on cavity mode analysis of SL-RSOA for GPON
Fulltext Access 5 Pages 2009
Bidirectional colorless gigabit WDM-passive optical networks by use of injection locking and optical carrier suppression
Fulltext Access 5 Pages 2009
A new waveband switching method for reducing the number of ports in wavelength-division-multiplexing optical networks
Fulltext Access 5 Pages 2009
Security weakness of Tseng’s fault-tolerant conference-key agreement protocol
Fulltext Access 5 Pages 2009
A novel domain-by-domain survivable mechanism in multi-domain wavelength-division-multiplexing optical networks
Fulltext Access 5 Pages 2009
A new algorithm with segment protection and load balancing for single-link failure in multicasting survivable networks
Fulltext Access 5 Pages 2009
Evolution of the probability density functions of Gaussian ASE noise in zero-memory nonlinear fiber
Fulltext Access 5 Pages 2009
Mapping of nomadic multimedia applications on the ADRES reconfigurable array processor
Fulltext Access 5 Pages 2009
Software engineering education: How far we’ve come and how far we have to go
Fulltext Access 5 Pages 2009
Code reusuable optical CDMA system using an array of superstructured fiber Bragg gratings
Fulltext Access 5 Pages 2009
Effects of the Random Diagonal code link parameters on the performance of an OCDMA scheme for high-speed access networks
Fulltext Access 5 Pages 2009
Using 10 Gb/s remodulation DPSK signal in self-restored colorless WDM-PON system
Fulltext Access 5 Pages 2009
A near-optimal routing and dimensioning algorithm for dynamic WDM rings
Fulltext Access 5 Pages 2009
An evaluation of the optical fiber beam as a force sensor
Fulltext Access 5 Pages 2009
Modeling and simulation of WDM optical networks under traffic control protocols
Fulltext Access 5 Pages 2009
Versatile universal voltage-mode filter employing DDCCs
Fulltext Access 5 Pages 2009
Improvement of turbo decoding using cross-entropy
Fulltext Access 5 Pages 2009
Robust feature points extraction for image registration based on the nonsubsampled contourlet transform
Fulltext Access 5 Pages 2009
Shorted planar triangular patch antenna with dual-frequency operation
Fulltext Access 5 Pages 2009
A performance analysis of polling schemes for IEEE 802.11 MAC over the Gilbert–Elliot channel
Fulltext Access 5 Pages 2009
Electronically tunable floating inductance simulator
Fulltext Access 5 Pages 2009
Tunable wave propagation in linear ferrite film bound by Kerr-type media
Fulltext Access 5 Pages 2009
Asymptotic throughput analysis of multicast transmission schemes
Fulltext Access 5 Pages 2009
Bandwidth enhancement of a printed wide-slot antenna with small slots
Fulltext Access 5 Pages 2009
A modified CMOS differential operational transresistance amplifier (OTRA)
Fulltext Access 5 Pages 2009
Fast system load estimation in the IEEE 802.16 OFDMA network
Fulltext Access 5 Pages 2009
A new algorithm based on auxiliary virtual topology for sub-path protection in WDM optical networks
Fulltext Access 5 Pages 2009
An inkjet-deposited antenna for 2.4 GHz applications
Fulltext Access 5 Pages 2009
Simplified soft value extraction for M-PPM-modulated signals in FSO systems
Fulltext Access 5 Pages 2009
Blind self-authentication of images for robust watermarking using integer wavelet transform
Fulltext Access 5 Pages 2009
MOS-C single amplifier biquads using the operational transresistance amplifier
Fulltext Access 5 Pages 2009
Evaluation of layer properties of effective parameters of metallic rod metamaterials in GHz frequencies
Fulltext Access 5 Pages 2009
End of Volume Reviewer Index
Fulltext Access 5 Pages 2009
A continuous-time least mean-phase adaptive filter for power system frequency estimation
Fulltext Access 5 Pages 2009
Short duration disturbance classifying based on S-transform maximum similarity
Fulltext Access 5 Pages 2009
Erroneous measurement detection in substation automation system using OLS based RBF neural network
Fulltext Access 5 Pages 2009
Recognition of electro-magnetic leakage information from computer radiation with SVM
Fulltext Access 5 Pages 2009
An area/performance trade-off analysis of a GF(2m) multiplier architecture for elliptic curve cryptography
Fulltext Access 5 Pages 2009
Identity-based strong designated verifier signature schemes: Attacks and new construction
Fulltext Access 5 Pages 2009
Design methodology for battery powered embedded systems — In safety critical application
Fulltext Access 5 Pages 2009
A conference key agreement protocol with fault-tolerant capability
Fulltext Access 5 Pages 2009
Efficient and provably-secure certificateless short signature scheme from bilinear pairings
Fulltext Access 5 Pages 2009
Threshold authenticated encryption scheme using labor-division signature
Fulltext Access 5 Pages 2009
A novel application of grey system theory to information security (Part I)
Fulltext Access 5 Pages 2009
A generalized method to improve the location accuracy of the single-ended sampled data and lumped parameter model based fault locators
Fulltext Access 5 Pages 2009
Two improved two-party identity-based authenticated key agreement protocols
Fulltext Access 5 Pages 2009
Digital multisignature on the generalized conic curve over Zn
Fulltext Access 5 Pages 2009
Strongly Hamiltonian laceability of the even k-ary n-cube
Fulltext Access 5 Pages 2009
An improved bilinear pairing based remote user authentication scheme
Fulltext Access 5 Pages 2009
Cryptanalysis and improvement of a threshold proxy signature scheme
Fulltext Access 5 Pages 2009
Secure multiple-times proxy signature scheme
Fulltext Access 5 Pages 2009
RETRACTED: The software engineering model's categories of compliance
Fulltext Access 5 Pages 2009
On the security of a copyright protection scheme based on visual cryptography
Fulltext Access 5 Pages 2009
Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards
Fulltext Access 5 Pages 2009
A dandelion-encoded evolutionary algorithm for the delay-constrained capacitated minimum spanning tree problem
Fulltext Access 5 Pages 2009
A novel identity-based multi-signcryption scheme
Fulltext Access 5 Pages 2009
Space–time code selection for OFDM–MISO systems
Fulltext Access 5 Pages 2009
<< < 294 295 296 297 298 > >>
Related Topics
Communication Articles
3997 Papers
synchronization Articles
2257 Papers
Encapsulation Articles
2128 Papers
Social media Articles
2052 Papers
Security Articles
2003 Papers
Noise Articles
1945 Papers
Networks Articles
1902 Papers
Compression Articles
1807 Papers
Database Articles
1771 Papers
Cloud computing Articles
1472 Papers
GPS Articles
1452 Papers
Social networks Articles
1409 Papers
Computer simulations Articles
1253 Papers
Routing Articles
1141 Papers
Simulations Articles
1129 Papers
information technology Articles
1089 Papers
Complex networks Articles
1011 Papers
Telemedicine Articles
949 Papers
Smart grid Articles
830 Papers
Quality of service Articles
782 Papers
E-commerce Articles
689 Papers
Injection Articles
668 Papers
Facebook Articles
666 Papers
Geographic information systems Articles
645 Papers
Wireless sensor network Articles
638 Papers
ICT Articles
638 Papers
e-Learning Articles
605 Papers
Computer-mediated communication Articles
569 Papers
Distributed control Articles
550 Papers
Telecommunications Articles
537 Papers
Smartphone Articles
520 Papers
Artificial Intelligence Articles
Computational Theory and Mathematics Articles
Computer Graphics and Computer-Aided Design Articles
Computer Networks and Communications Articles
Computer Science (General) Articles
Computer Science Applications Articles
Computer Vision and Pattern Recognition Articles
Hardware and Architecture Articles
Human-Computer Interaction Articles
Information Systems Articles
Signal Processing Articles
Software Articles
All Topics
Related Journals
Artificial Intelligence Journals
Computational Theory and Mathematics Journals
Computer Graphics and Computer-Aided Design Journals
Computer Networks and Communications Journals
Computer Science (General) Journals
Computer Science Applications Journals
Computer Vision and Pattern Recognition Journals
Hardware and Architecture Journals
Human-Computer Interaction Journals
Information Systems Journals
Signal Processing Journals
Software Journals
International Journal of Critical Infrastructure Protection Journal
Electronic Commerce Research and Applications Journal
International Journal of Electrical Power & Energy Systems Journal
Future Generation Computer Systems Journal
Journal of Computational Science Journal
Journal of Innovation in Digital Ecosystems Journal
Journal of Parallel and Distributed Computing Journal
Ad Hoc Networks Journal
AEU - International Journal of Electronics and Communications Journal
Computer Communications Journal
Computer Networks Journal
Computer Standards & Interfaces Journal
Computers & Electrical Engineering Journal
Computers & Security Journal
Digital Investigation Journal
Information Security Technical Report Journal
Infosecurity Journal
Infosecurity Today Journal
Journal of Information Security and Applications Journal
Journal of Network and Computer Applications Journal
Journal of Systems Architecture Journal
Journal of Systems and Software Journal
Microprocessors and Microsystems Journal
Nano Communication Networks Journal
Optical Fiber Technology Journal
Optical Switching and Networking Journal
Performance Evaluation Journal
Pervasive and Mobile Computing Journal
Physical Communication Journal
Telematics and Informatics Journal
Vehicular Communications Journal

Daneshyari.com

دسترسی سریع

  • صفحه اصلی دانشیاری
  • دسته بندی موضوعی مقالات
  • مقالات ترجمه شده
  • سفارش ترجمه مقاله
  • سفارش تولید محتوا
  • تولید محتوا

ارتباط

  • ورود
  • عضویت
  • تماس و پشتیبانی
  • تبلیغات

English Website

  • Home
  • Physical Sciences and Engineering
  • Life Sciences
  • Health Sciences
  • Social Sciences and Humanities