Digital Library


Search: "" (844)

  1. An Efficient Bit-Level Lossless Grayscale Image Compression Based on Adaptive Source Mapping

  2. Practical (Second) Preimage Attacks on the TCS_SHA-3 Family of Cryptographic Hash Functions

  3. The Effect of Multiple Energy Detector on Evidence Theory Based Cooperative Spectrum Sensing Scheme for Cognitive Radio Networks

  4. Using Mobile Data Collectors to Enhance Energy Efficiency and Reliability in Delay Tolerant Wireless Sensor Networks

  5. Geohashed Spatial Index Method for a Location-Aware WBAN Data Monitoring System Based on NoSQL

  6. Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes

  7. Comparative Study of Evaluating the Trustworthiness of Data Based on Data Provenance

  8. Mitigating Threats and Security Metrics in Cloud Computing

  9. An Improved Algorithm for Redundancy Detection Using Global Value Numbering

  10. Inter-Domain Mobility Management Based on the Proxy Mobile IP in Mobile Networks