- Designing for privacy in ubiquitous social networking
- Principal component analysis-based data reduction model for wireless sensor networks
- An improved biometric-based remote user authentication scheme for connected healthcare
- A new handover authentication protocol based on bilinear pairing functions for wireless networks
- Anti-forensic steganography using multi-bit MER with flexible bit location
- A quantitative and knowledge-based approach to choosing security architectural tactics
- Security analysis and improvement of a mutual authentication scheme under trusted computing
- Reconfigurable content-based image retrieval on peer-to-peer networks
- Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue
31 January 2016
Free sample articles newly available from International Journal of Ad Hoc and Ubiquitous Computing
The following sample articles from the International Journal of Ad Hoc and Ubiquitous Computing are now available here for free:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment