EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: isPartOf:"International Journal of Business Data Communications and Networking (IJBDCN)"
Narrow search

Narrow search

Year of publication
Subject
All
Authentication 4 BAN Logic 3 Ant Colony Optimization 2 Performance Analysis 2 RFID 2 RSA 2 Security 2 Security Attacks 2 Synchronization 2 4G 1 ALOHA 1 AODV 1 AVISPA 1 Adaptive Directional Monitoring 1 Advanced Encryption Standard 1 Algorithm Selection 1 Always Best Connected 1 Amplify and Forward 1 Anomaly Detection 1 Anonymous 1 BAN 1 BTM 1 Ban 1 Base Station (BS) 1 Big Data 1 Bin Packing 1 Biometric Technologies 1 Biometrics Deployment 1 Boycott 1 Breakage 1 Buffered Routing 1 Business Growth and Development 1 CSMA/CD 1 Cloud Computing 1 Cloud Environment 1 Collaborative Information 1 Collaborative Information System 1 Collision 1 Communication 1 Computer Network 1
more ... less ...
Online availability
All
Undetermined 35
Type of publication
All
Article 35
Language
All
English 35
Author
All
Om, Hari 4 Saini, Hemraj 3 Chandrakar, Preeti 2 Li, Peng 2 Pal, Arup Kumar 2 Xu, He 2 Abid, Mohamed 1 Agrawal, Nitesh Kumar 1 Ali, Rifaqat 1 Alzaid, Wael 1 Babu, B. Sathish 1 Bai, Peng 1 Belghith, Abdelfettah 1 Biswas, G. P. 1 Bose, Chayanika 1 Bouadem, Nassima 1 Buttigieg, Sandra 1 Chandnani, Manali 1 Chattopadhyay, Asis 1 Dass, Prajnamaya 1 Ding, Ye 1 Dong, Lu 1 Eswaran C. 1 Fatimah, P.L. Rika 1 Garg, Lalit 1 Gopalan M. 1 Guermazi, Abderrahmen 1 Guo, Yuanbo 1 Gupta, Vipul 1 Hilles, Shadi M. S. 1 Hu, Yanjing 1 Hämmäinen, Heikki 1 Inamdar, Sadanand 1 Issac, Biju 1 Ju, Ankang 1 Kacimi, Rahim 1 Khandelwal, Mukesh Kumar 1 Khare, Ayush 1 Kumar, Amit 1 Lanovara, Ivan 1
more ... less ...
Published in...
All
International Journal of Business Data Communications and Networking (IJBDCN) 35
Source
All
Other ZBW resources 35
Showing 31 - 35 of 35
Cover Image
A Soft Computing Approach for Data Routing in Hospital Area Networks (HAN)
Rakhee; Srinivas, M. B. - In: International Journal of Business Data Communications … 12 (2016) 2, pp. 16-27
This paper proposes an alternative model to deliver vital signs of patients in a hospital indoor environment where a large number of patients exist and the traffic generated rapidly changes over time using Body Area Network (BAN). The methodology for finding an optimal path includes a...
Persistent link: https://www.econbiz.de/10012043261
Saved in:
Cover Image
Improved Traceable-Resistant Efficient Authentication Schemes for Wireless Networks
Dass, Prajnamaya; Saha, Pranay Kumar; Om, Hari - In: International Journal of Business Data Communications … 12 (2016) 2, pp. 28-61
Wireless technology is widely spread everywhere in the real world and has a biggest contribution to mankind. However, with the vitality of wireless architectures, security protocols are vulnerable to attackers outside the system, failure in wireless connectivity and machine failures. Protocols...
Persistent link: https://www.econbiz.de/10012043262
Saved in:
Cover Image
A Secure Two-Factor Remote User Authentication and Session Key Agreement Scheme
Om, Hari; Chandrakar, Preeti - In: International Journal of Business Data Communications … 12 (2016) 2, pp. 62-79
In this article, the authors have proposed a secure two-factor remote user authentication and session key agreement protocol. As they have shown in the presented scheme, is precise and secure according to both formal and informal security analysis. For formal security analysis, they have applied...
Persistent link: https://www.econbiz.de/10012043263
Saved in:
Cover Image
An Improved Size Invariant (n, n) Extended Visual Cryptography Scheme
Sharma, Rahul; Agrawal, Nitesh Kumar; Khare, Ayush; … - In: International Journal of Business Data Communications … 12 (2016) 2, pp. 80-88
In this paper, the authors have presented a (n, n) extended visual cryptography scheme where n numbers of meaningful shares furnish a visually secret message. Initially they have converted a grayscale image into binary image using dithering method. Afterwards, they have incorporated pixel's...
Persistent link: https://www.econbiz.de/10012043264
Saved in:
Cover Image
Lightweight, ECC based RFID Authentication Scheme for WLAN
Om, Hari; Kumar, Amit - In: International Journal of Business Data Communications … 12 (2016) 2, pp. 89-103
Wireless local area networks (WLANs), like IEEE 802.11, are right now very common in numerous outdoor or indoor environments for providing wireless communication among WiFi-enabled devices by accessing an Access Point (infrastructure mode) or through peer to peer connections (ad hoc mode)....
Persistent link: https://www.econbiz.de/10012043265
Saved in:
  • First
  • Prev
  • 1
  • 2
  • 3
  • 4
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...