default search action
International Journal of Information and Communication Technology, Volume 12
Volume 12, Numbers 1/2, 2018
- Xiaoqing Tan, Xiaoqian Zhang:
Quantum information exchange protocol associated with the quantum cloud. 1-15 - Zhengjun Jing, Guoping Jiang, Chunsheng Gu:
A novel identity-based anonymous authentication scheme from multilinear maps. 16-30 - Qiu-Yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang:
An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string. 31-50 - Ankur Mishra, Brij B. Gupta:
Intelligent phishing detection system using similarity matching algorithms. 51-73 - Syam Kumar Pasupuleti:
Effective and secure data storage in multi-cloud storage architectures. 74-97 - Yang Jing, Zeng Hui, Huang Jiangping:
Grey neural network prediction model based on fruit fly optimisation algorithm and its application. 98-112 - Jianhong Zhang, Xubing Zhao, Weina Zhen:
S2PAD: secure self-certified public auditing for data integrity in cloud storage and its extension. 113-130 - S. Anthoniraj, S. Saraswathi:
Frequent failure monitoring and reporting in virtualisation environment using backing algorithm technique. 131-142 - Xiaoli Gong, Zhaoyang Shao, Qi Du, Aimin Yu, Jin Zhang:
Performance overhead analysis of virtualisation on ARM. 143-161 - Hang Yang, Peng Li, Xiaobin Guo, Huajun Chen, Zhiqiang Lin:
A review: The effects of imperfect data on incremental decision tree. 162-174 - Wei Zhang:
The design of strain sensitising of high-sensitivity SAW sensor based on FBG. 175-185 - Ali Kanso, Abdelouahed Gherbi, Yves Lemieux:
Middleware-managed high availability for cloud applications. 186-208 - Guoqiang Gao, Ruixuan Li, Zhiyong Xu:
Mimir: a term-distributed retrieval system for secret documents. 209-228
Volume 12, Numbers 3/4, 2018
- Aris M. Ouksel, Doug Lundquist:
A hybrid ad hoc networking protocol for disaster recovery resource management. 232-245 - Mohamed Hefeida, Ashfaq A. Khokhar:
Medium access control in wireless sensor networks: a survey. 246-270 - Bahia Zebbane, Manel Chenait, Chafika Benzaid, Nadjib Badache:
RTCP: a redundancy aware topology control protocol for wireless sensor networks. 271-298 - Adnan Fida, Nor Tuah Jaidi, Trung Dung Ngo:
Coordinated route reconfiguration for throughput optimisation under Rician fading channel. 299-318 - Nawel Bendimerad, Kechar Bouabdellah:
Coverage enhancement with occlusion avoidance in networked rotational video sensors for post-disaster management. 319-344 - Tiago Badre Marino, Maria Luiza Machado Campos, Marcos R. S. Borges, John G. Breslin, Maciej Dabrowski:
Architecture for gathering and integrating collaborative information for decision support in emergency situations. 345-363 - Karima Ait Abdelouhab, Djilali Idoughi, Christophe Kolski:
A framework combining agile, user-centred design and service-oriented architecture approaches for collaborative disaster management system design. 364-392 - Djalal Hedjazi:
Constructing collective competence: a new CSCW-based approach. 393-416
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.