EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: isPartOf:"International Journal of Business Data Communications and Networking (IJBDCN)"
Narrow search

Narrow search

Year of publication
Subject
All
Authentication 4 BAN Logic 3 Ant Colony Optimization 2 Performance Analysis 2 RFID 2 RSA 2 Security 2 Security Attacks 2 Synchronization 2 4G 1 ALOHA 1 AODV 1 AVISPA 1 Adaptive Directional Monitoring 1 Advanced Encryption Standard 1 Algorithm Selection 1 Always Best Connected 1 Amplify and Forward 1 Anomaly Detection 1 Anonymous 1 BAN 1 BTM 1 Ban 1 Base Station (BS) 1 Big Data 1 Bin Packing 1 Biometric Technologies 1 Biometrics Deployment 1 Boycott 1 Breakage 1 Buffered Routing 1 Business Growth and Development 1 CSMA/CD 1 Cloud Computing 1 Cloud Environment 1 Collaborative Information 1 Collaborative Information System 1 Collision 1 Communication 1 Computer Network 1
more ... less ...
Online availability
All
Undetermined 35
Type of publication
All
Article 35
Language
All
English 35
Author
All
Om, Hari 4 Saini, Hemraj 3 Chandrakar, Preeti 2 Li, Peng 2 Pal, Arup Kumar 2 Xu, He 2 Abid, Mohamed 1 Agrawal, Nitesh Kumar 1 Ali, Rifaqat 1 Alzaid, Wael 1 Babu, B. Sathish 1 Bai, Peng 1 Belghith, Abdelfettah 1 Biswas, G. P. 1 Bose, Chayanika 1 Bouadem, Nassima 1 Buttigieg, Sandra 1 Chandnani, Manali 1 Chattopadhyay, Asis 1 Dass, Prajnamaya 1 Ding, Ye 1 Dong, Lu 1 Eswaran C. 1 Fatimah, P.L. Rika 1 Garg, Lalit 1 Gopalan M. 1 Guermazi, Abderrahmen 1 Guo, Yuanbo 1 Gupta, Vipul 1 Hilles, Shadi M. S. 1 Hu, Yanjing 1 Hämmäinen, Heikki 1 Inamdar, Sadanand 1 Issac, Biju 1 Ju, Ankang 1 Kacimi, Rahim 1 Khandelwal, Mukesh Kumar 1 Khare, Ayush 1 Kumar, Amit 1 Lanovara, Ivan 1
more ... less ...
Published in...
All
International Journal of Business Data Communications and Networking (IJBDCN) 35
Source
All
Other ZBW resources 35
Showing 11 - 20 of 35
Cover Image
MAQ: A Mobile Agent Based Quality of Service Platform for MANETs
Pattanayak, Binod Kumar; Rath, Mamata - In: International Journal of Business Data Communications … 13 (2017) 1, pp. 1-8
Protected data transmission in cluster based Mobile Adhoc Networks (MANETs) is a challenging mission due to the high level of node mobility of nodes and resource constrained autonomous stations during packet routing. To target this mission, a Mobile Agent based QoS (MAQ) platform has been...
Persistent link: https://www.econbiz.de/10012043266
Saved in:
Cover Image
A Survey on Synchronization Approach in MAC Layer Protocols
Chandnani, Manali; Khandelwal, Mukesh Kumar; Sharma, Meeta - In: International Journal of Business Data Communications … 13 (2017) 1, pp. 9-27
The Open Systems Interconnection (OSI) model describes the layered approach for communication between two networked systems. The Data link layer of OSI model consists of a sub layer known as MAC layer for achieving coordination among the communicating nodes to access the shared channel. This...
Persistent link: https://www.econbiz.de/10012043267
Saved in:
Cover Image
Secure Buffer-Based Routing Protocol for WMN
Rathee, Geetanjali; Saini, Hemraj - In: International Journal of Business Data Communications … 13 (2017) 1, pp. 28-44
Secure routing is considered as one of a key challenge in mesh networks because of its dynamic and broadcasting nature. The broadcasting nature of mesh environment invites number of security vulnerabilities to come and affect the network metrics drastically. Further, any node/link failure of a...
Persistent link: https://www.econbiz.de/10012043268
Saved in:
Cover Image
Performance Evaluation of VM Placement Using Classical Bin Packing and Genetic Algorithm for Cloud Environment
Saini, Hemraj; Sharma, Oshin - In: International Journal of Business Data Communications … 13 (2017) 1, pp. 45-57
In current era, the trend of cloud computing is increasing with every passing day due to one of its dominant service i.e. Infrastructure as a service (IAAS), which virtualizes the hardware by creating multiple instances of VMs on single physical machine. Virtualizing the hardware leads to the...
Persistent link: https://www.econbiz.de/10012043269
Saved in:
Cover Image
Mathematical Model for Cyber Attack in Computer Network
Saini, Hemraj; Rao, Yerra Shankar; Rauta, Aswin Kumar; … - In: International Journal of Business Data Communications … 13 (2017) 1, pp. 58-65
This investigation focuses to develop an e-SEIRS (susceptible, exposed, infectious, recovered) epidemic computer network model to study the transmission of malicious code in a computer network and derive the approximate threshold condition (basic reproduction number) to examine the equilibrium...
Persistent link: https://www.econbiz.de/10012043270
Saved in:
Cover Image
Modification of Traditional RSA into Symmetric-RSA Cryptosystems
Mohit, Prerna; Biswas, G. P. - In: International Journal of Business Data Communications … 13 (2017) 1, pp. 66-73
This paper addresses the modification of RSA cryptography namely Symmetric-RSA, which seem to be equally useful for different cryptographic applications such as encryption, digital signature, etc. In order to design Symmetric-RSA, two prime numbers are negotiated using Diffie-Hellman key...
Persistent link: https://www.econbiz.de/10012043271
Saved in:
Cover Image
A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem
Ali, Rifaqat; Pal, Arup Kumar - In: International Journal of Business Data Communications … 13 (2017) 1, pp. 74-84
In remote user authentication, a server confirms the authenticity of a user via unreliable channel. Several authentication protocols are devised in the literature relied on the identity, password and biometric of a user. But, most of the authentication protocols are either computationally...
Persistent link: https://www.econbiz.de/10012043272
Saved in:
Cover Image
Cryptanalysis and Security Enhancement of Three-Factor Remote User Authentication Scheme for Multi-Server Environment
Chandrakar, Preeti; Om, Hari - In: International Journal of Business Data Communications … 13 (2017) 1, pp. 85-101
Recently, Om et al. proposed three-factor remote user authentication protocol using ElGamal cryptosystem and ensured that it is withstands to various kinds of security attacks. But, the authors review carefully Om et al.'s scheme and discover that it unable to resist three attacks (like password...
Persistent link: https://www.econbiz.de/10012043273
Saved in:
Cover Image
Multi-Modal Biometric Authentication and Secure Transaction Operation Framework for E-Banking
Sabharwal, Munish - In: International Journal of Business Data Communications … 13 (2017) 1, pp. 102-116
The rationale of the research work is to suggest a multi-modal biometric authentication and secure transaction operation framework for E-Banking. The literature survey identifies the various types of E-Banking Channels available as on-date, the various types of biometric technologies available...
Persistent link: https://www.econbiz.de/10012043274
Saved in:
Cover Image
Dynamic Combined with Static Analysis for Mining Network Protocol's Hidden Behavior
Hu, Yanjing; Pei, Qingqi - In: International Journal of Business Data Communications … 13 (2017) 2, pp. 1-14
Unknown protocol's hidden behavior is becoming a new challenge in network security. This paper takes the captured messages and the binary code that implement the protocol both as the studied object. Dynamic Taint Analysis combined with Static Analysis is used for protocol analyzing. Firstly,...
Persistent link: https://www.econbiz.de/10012043275
Saved in:
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
  • Next
  • Last
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...