default search action
NSysS 2016: Dhaka, Bangladesh
- International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016. IEEE 2016, ISBN 978-1-5090-0203-0
- Tareq Anwer Sohan, Hasib Hamidul Haque, Asif Hasan, Jahidul Islam, Alim Al Islam:
A graph coloring based dynamic channel assignment algorithm for cognitive radio vehicular Ad Hoc networks. 1-8 - Khairul Alam, Kazi Md. Rokibul Alam, Omar Faruq, Yasuhiko Morimoto:
A comparison between RSA and ElGamal based untraceable blind signature schemes. 1-4 - Sujan Sarker, Amit Kumar Nath, Md. Abdur Razzaque:
Tradeoffs between sensing quality and energy efficiency for context monitoring applications. 1-7 - Marufur Rahman, Rezaul Karim:
Comparative study of different methods of social network analysis and visualization. 1-7 - Nazmul Islam:
Certificate revocation in vehicular Ad Hoc networks: a novel approach. 1-5 - Mamtaj Akter, Alimul Islam, Ashikur Rahman:
Fault tolerant optimized broadcast for wireless Ad-Hoc networks. 1-9 - Sajeda Akter, Farzana Rahman, A. B. M. Alim Al Islam:
Securing app distribution process of iOS exploiting the notion of authentic update. 1-8 - Mohammad Saifur Rahman, Yusuf Sarwar Uddin, M. Sohel Rahman, M. Kaykobad:
Using adaptive heartbeat rate on long-lived TCP connections. 1-9 - Sharif Hossen, Muhammad Sajjadur Rahim:
Impact of mobile nodes for few mobility models on delay-tolerant network routing protocols. 1-6 - Saidur Rahman, Anika Anzum Prima, Md. Abdur Razzaque:
Optimal allocation of 3G budget for smartphones running heterogeneous applications. 1-6 - Nova Ahmed, Md. Abul Kalam Azad, Mahmudur Rahman Khan, Ahsan Habib, Shuvashish Ghosh, Sabiha Shahid:
ShonaBondhu: a cloud based system to handle flash flood. 1-6 - Afroza Sultana, Mahmuda Naznin, Rifat Shahriyar:
Conflicting goal constrained architecture of a heterogeneous mobile sensor network. 1-6 - Shahidul Islam Khan, Abu Sayed Md. Latiful Hoque:
Privacy and security problems of national health data warehouse: a convenient solution for developing countries. 1-6 - Nusrat Jahan Oishi, Arafin Mahamud, Asaduzzaman:
Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6. 1-5 - A. H. M. Kamal, Mohammad Mahfuzul Islam:
Enhancing the embedding payload by handling the affair of association and mapping of block pixels through prediction errors histogram. 1-8 - Iftakhar Ahmad, Sinthia Kabir, Tanzila Choudhury, A. B. M. Alim Al Islam:
Enhancing security in specialized use of mobile IP. 1-9 - Saiyma Sarmin, Saurabh Bagchi, Alim Al Islam:
Chameleon: defending secret information from eavesdropping over physical environment. 1-5 - Kazi Sinthia Kabir, Tusher Chakraborty, A. B. M. Alim Al Islam:
Supercrypt: a technique for quantum cryptography through simultaneously improving both security level and data rate. 1-9 - Annajiat Alim Rasel, Mohammed Eunus Ali:
UProve2: privacy-aware, scalable, ubiquitous provenance to enhance file search. 1-5 - Fariha Tasmin Jaigirdar, Mohammad Mahfuzul Islam:
A new cost-effective approach for battlefield surveillance in wireless sensor networks. 1-6 - Mofijul Islam, Md. Abdur Razzaque, Jahidul Islam:
A genetic algorithm for virtual machine migration in heterogeneous mobile cloud computing. 1-6 - Sayef Azad Sakin, Md. Abdur Razzaque:
Game theoretic downlink resource scheduling for self-coexisting cognitive radio networks. 1-7
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.