


default search action
International Journal of Internet Protocol Technology, Volume 8
Volume 8, Number 1, 2014
- Anirban Kundu

, Lin Luan, Ruopeng Liu:
Synchronisation of data transfer in cloud. 1-24 - Hao-Li Wang, Rong-Guei Tsai, Ray Yueh-Min Huang:

Enhanced quality of service control scheme with high availability for self-optimising wireless sensor network. 25-32 - Jifeng Liao, Xiaodong Yang:

A handover algorithm in the converged networks of CMMB and TD-MBMS. 33-43 - Behzad Akbari, Hamidreza Rabiee

, Mohammed Ghanbari
:
Performance analysis of packet loss recovery policies in P2P video streaming. 44-53
Volume 8, Numbers 2/3, 2014
- Hicham El Khoury

, Romain Laborde
, François Barrère, Abdelmalek Benzekri, Maroun Chamoun
:
A data flow-oriented specification method for analysing network security configurations. 58-76 - Mohammed A. Ambusaidi, Zhiyuan Tan

, Xiangjian He
, Priyadarsi Nanda, Liang Fu Lu, Aruna Jamdagni:
Intrusion detection method based on nonlinear correlation measure. 77-86 - Xiaoping Lou, Jun Dai, Zhigang Chen, Moon Ho Lee:

An efficient quantum anonymous communication with hybrid entanglement swapping. 87-95 - Yang Lu, Jiguo Li:

Efficient constructions of certificate-based key encapsulation mechanism. 96-106 - Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang:

Efficient identity-based threshold signature scheme from bilinear pairings in standard model. 107-115 - Li Zhang, Ying Guo, Dazu Huang:

High-efficient quantum secret sharing with arrangements of lines on two-dimensional planes. 116-121 - Wei Ren

, Jiahua Lin, Qiang Cao, Liangli Ma:
LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing. 122-129 - Wei Yang, Yong-peng Gao, Zhiliang Zhu, Guiran Chang, Yu Yao:

Modelling, analysis and containment of passive worms in P2P networks. 130-142 - Jinjing Shi, Ronghua Shi, Yin Li, Ye Kang, Xiaoqi Peng:

Quantum states sharing in the relay system with teleportation of non-maximally entanglement. 143-149 - Yong Yan Chen, Hong Chun Shu:

The algorithm model for cumulative vulnerability risk assessment. 150-157
Volume 8, Number 4, 2014
- Utharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee:

Ticket model: a generalised model for internet-based three-party authorisation systems. 159-168 - Huixiang Zhang, Chunlei Chen, Hairui Zhou, Guanzhong Dai:

Max-min fair rate allocation for VCP in multi-bottleneck networks. 169-180 - Xiao Peng, Runtong Chen:

Energy-efficiency enhanced virtual machine deployment policy for data-intensive applications in cloud platforms. 181-189 - Benbin Chen, Donghui Guo:

Markov parameters tuning prediction to improve cache hit rate. 190-199 - Vaibhav Soni

, Dheeresh Kumar Mallick
:
Location-based routing protocols in wireless sensor networks: a survey. 200-213

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














