Digital Library
Search: "" (1060)
-
Ayman Al-Dmour, Mohammed Abuhelaleh, Ahmed Musa, Hasan Al-Shalabi
Vol. 12, No. 2, pp. 322-331, Jun. 2016
10.3745/JIPS.03.0051
Keywords: Bit-Level, Lempel-Ziv Coding, Lossless Image Compression, Source Encoding -
Gautham Sekar, Soumyadeep Bhattacharya
Vol. 12, No. 2, pp. 310-312, Jun. 2016
10.3745/JIPS.03.0021
Keywords: cryptanalysis, Hash Function, (Second) Preimage Attack -
Muhammad Sajjad Khan, Insoo Koo
Vol. 12, No. 2, pp. 295-309, Jun. 2016
10.3745/JIPS.03.0040
Keywords: cognitive radio, Contention-Aware Reporting, Cooperative Spectrum Sensing, Evidence Theory (D-S Theory), Multiple Energy Detector, Sequential Data Fusion -
Yasmine-Derdour, Bouabdellah-Kechar, Mohammed Fayc?al-Khelfi
Vol. 12, No. 2, pp. 275-294, Jun. 2016
10.3745/JIPS.03.0032
Keywords: Data Collection, MDCs, Mobility Model, Mobile Relay, Mobile Sink, Simulation, WSNs -
Yan Li, Dongho Kim, Byeong-Seok Shin
Vol. 12, No. 2, pp. 263-274, Jun. 2016
10.3745/JIPS.04.0025
Keywords: Location-aware, NoSQL Database System, WBAN Monitoring System -
Samaneh Mashhadi
Vol. 12, No. 2, pp. 249-262, Jun. 2016
10.3745/JIPS.03.0050
Keywords: Non-Repudiation, Proxy Signature Scheme, Signature Scheme, Threshold Proxy Signature, Unforgeability -
Kuldeep Gurjar, Yang-Sae Moon
Vol. 12, No. 2, pp. 234-248, Jun. 2016
10.3745/JIPS.04.0024
Keywords: Data Provenance, Trustworthiness of Data, Data Quality, Trustworthiness Evaluation, Trust Score -
Jayaprakash Kar, Manoj Ranjan Mishra
Vol. 12, No. 2, pp. 226-233, Jun. 2016
10.3745/JIPS.03.0049
Keywords: Dynamic Access Control, Risk Assessment, Security Intelligence -
Nabizath Saleena, Vineeth Paleri
Vol. 12, No. 2, pp. 214-225, Jun. 2016
10.3745/JIPS.02.0014
Keywords: Equivalent Expression, Global Value Numbering, Herbrand Equivalence, Strong Equivalence Dag -
Moneeb Gohar, Seok-Joo Koh
Vol. 12, No. 2, pp. 196-213, Jun. 2016
10.3745/JIPS.03.0037
Keywords: Comparison, HIP, LTE, LISP, MIP, Mobility Management, PMIP, SAE