95 | -- | 106 | J. Gnanambigai, N. Rengarajan. A novel approach to enhance the network lifetime for hybrid routing protocol |
107 | -- | 120 | Yasmina Ghebghoub, Saliha Oukid, Omar Boussaid. An MDA approach to secure access to data on cloud using implicit security |
121 | -- | 138 | Farah-Sarah Ouada, Mawloud Omar, Abdelmadjid Bouabdallah, Abdelkamel Tari. Lightweight identity-based authentication protocol for wireless sensor networks |
139 | -- | 157 | Pramod T. C, N. R. Sunitha. Key pre-distribution schemes to support various architectural deployment models in WSN |
158 | -- | 180 | RajaSekhar Rajaboina, P. Chenna Reddy, Raja Ashok Kumar, Nangil Venkatramana. Performance comparison of TCP, UDP and TFRC in static wireless environment |
181 | -- | 204 | Kavitha Ammayappan. Formally verified TSM centric privacy preserving NFC mobile payment framework and protocol |