Journal: IJIPT

Volume 8, Issue 4

159 -- 168Utharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee. Ticket model: a generalised model for internet-based three-party authorisation systems
169 -- 180Huixiang Zhang, Chunlei Chen, Hairui Zhou, Guanzhong Dai. Max-min fair rate allocation for VCP in multi-bottleneck networks
181 -- 189Xiao Peng, Chen Runtong. Energy-efficiency enhanced virtual machine deployment policy for data-intensive applications in cloud platforms
190 -- 199Benbin Chen, Donghui Guo. Markov parameters tuning prediction to improve cache hit rate
200 -- 213Vaibhav Soni, Dheeresh K. Mallick. Location-based routing protocols in wireless sensor networks: a survey

Volume 8, Issue 2/3

58 -- 76Hicham El Khoury, Romain Laborde, François Barrère, Abdelmalek Benzekri, Maroun Chamoun. A data flow-oriented specification method for analysing network security configurations
77 -- 86Mohammed A. Ambusaidi, Zhiyuan Tan, Xiangjian He, Priyadarsi Nanda, Liang Fu Lu, Aruna Jamdagni. Intrusion detection method based on nonlinear correlation measure
87 -- 95Xiaoping Lou, Jun Dai, Zhigang Chen, Moon Ho Lee. An efficient quantum anonymous communication with hybrid entanglement swapping
96 -- 106Yang Lu, Jiguo Li. Efficient constructions of certificate-based key encapsulation mechanism
107 -- 115Fei Li, Wei Gao, Guilin Wang, Kefei Chen, Xueli Wang. Efficient identity-based threshold signature scheme from bilinear pairings in standard model
116 -- 121Li Zhang, Ying Guo, Dazu Huang. High-efficient quantum secret sharing with arrangements of lines on two-dimensional planes
122 -- 129Wei Ren, Jiahua Lin, Qiang Cao, Liangli Ma. LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing
130 -- 142Wei Yang, Yong-peng Gao, Zhiliang Zhu, Guiran Chang, Yu Yao. Modelling, analysis and containment of passive worms in P2P networks
143 -- 149Jinjing Shi, Ronghua Shi, Yin Li, Ye Kang, Xiaoqi Peng. Quantum states sharing in the relay system with teleportation of non-maximally entanglement
150 -- 157Yong Yan Chen, Hong Chun Shu. The algorithm model for cumulative vulnerability risk assessment

Volume 8, Issue 1

1 -- 24Anirban Kundu, Lin Luan, Ruopeng Liu. Synchronisation of data transfer in cloud
25 -- 32Hao-Li Wang, Rong-Guei Tsai, Ray Yueh-Min Huang. Enhanced quality of service control scheme with high availability for self-optimising wireless sensor network
33 -- 43Jifeng Liao, Xiaodong Yang. A handover algorithm in the converged networks of CMMB and TD-MBMS
44 -- 53Behzad Akbari, Hamid Reza Rabiee, Mohammed Ghanbari. Performance analysis of packet loss recovery policies in P2P video streaming