Data Collection in Multi-Application Sharing Wireless Sensor Networks

Data sharing for data collection among multiple applications is an efficient way to reduce communication cost for Wireless Sensor […]

Read More →

COST-AWARE SECURE ROUTING (CASER) PROTOCOL DESIGN FOR WIRELESS SENSOR NETWORKS

ABSTRACT: Lifetime optimization and security are two conflicting design issues for multi-hop wireless sensor networks (WSNs) with non-replenishable energy […]

Read More →

CONTENT-BASED IMAGE RETRIEVAL USING ERROR DIFFUSION BLOCK TRUNCATION CODING FEATURES

ABSTRACT: This paper presents a new approach to index color images using the features extracted from the error diffusion […]

Read More →

AUTHENTICATION HANDOVER AND PRIVACY PROTECTION IN 5G HETNETS USING SOFTWARE-DEFINED NETWORKING

ABSTRACT: Recently, densified small cell deployment with overlay coverage through coexisting heterogeneous networks has emerged as a viable solution […]

Read More →

Authenticated Key Exchange Protocols for Parallel Network File Systems

We study the problem of key establishment for secure many-to-many communications. The problem is inspired by the proliferation of […]

Read More →

AGGREGATED-PROOF BASED HIERARCHICAL AUTHENTICATION SCHEME FOR THE INTERNET OF THINGS

ABSTRACT: The Internet of Things (IoT) is becoming an attractive system paradigm to realize interconnections through the physical, cyber, […]

Read More →

A TIME EFFICIENT APPROACH FOR DETECTING ERRORS IN BIG SENSOR DATA ON CLOUD

ABSTRACT: Big sensor data is prevalent in both industry and scientific research applications where the data is generated with […]

Read More →

A SCALABLE AND RELIABLE MATCHING SERVICE FOR CONTENT-BASED PUBLISH/SUBSCRIBE SYSTEMS

ABSTRACT: Characterized by the increasing arrival rate of live content, the emergency applications pose a great challenge: how to […]

Read More →

A PROFIT MAXIMIZATION SCHEME WITH GUARANTEED QUALITY OF SERVICE IN CLOUD COMPUTING

ABSTRACT: As an effective and efficient way to provide computing resources and services to customers on demand, cloud computing […]

Read More →

A HYBRID CLOUD APPROACH FOR SECURE AUTHORIZED DEDUPLICATION

ABSTRACT: Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has […]

Read More →