Journal: Telecommunication Systems

Volume 70, Issue 4

491 -- 510Emmanuel Ahene, Junfeng Dai, Hao Feng, Fagen Li. A certificateless signcryption with proxy re-encryption for practical access control in cloud-based reliable smart grid
511 -- 523Nur Nabila Mohamed, Yusnani Mohd Yussoff, Mohd Anuar Mat Isa, Habibah Hashim. Extending hybrid approach to secure Trivial File Transfer Protocol in M2M communication: a comparative analysis
525 -- 540Walid A. Al-Hussaibi, Falah H. Ali. Group layer MU-MIMO for 5G wireless systems
541 -- 555Vladimir Kaplun, Michael Segal 0001. Breaching the privacy of connected vehicles network
557 -- 582Imran Memon, Hamid Turab Mirza, Qasim Ali Arain, Hina Memon. Multiple mix zones de-correlation trajectory privacy model for road network
583 -- 594Myoungbeom Chung. Short distance data transmission method using inaudible high-frequencies between smart devices
595 -- 616Abubakar Bello Tambawal, Rafidah Md. Noor, Rosli Salleh, Christopher Chembe, Mohammad Hossein Anisi, Oche Michael, Jaime Lloret. Time division multiple access scheduling strategies for emerging vehicular ad hoc network medium access control protocols: a survey
617 -- 634Le Hoang Son, Sudan Jha, Raghvendra Kumar, Jyotir Moy Chatterjee, Manju Khari. Collaborative handshaking approaches between internet of computing and internet of things towards a smart world: a review from 2009-2017

Volume 70, Issue 3

321 -- 336Khuong Ho-Van, Thiem Do-Dac. Performance analysis of jamming technique in energy harvesting cognitive radio networks
337 -- 348Philippe Ezran, Yoram Haddad 0001, Mérouane Debbah. Allais' paradox and resource allocation in telecommunication networks
349 -- 364Mahendra Kumar Murmu, Awadhesh Kumar Singh. Speedy leader election to avoid application discontinuity in cognitive radio networks
365 -- 377Sergio Leon Gaixas, Jordi Perelló, Davide Careglio, Eduard Grasa, Miquel Tarzan. End-user traffic policing for QoS assurance in polyservice RINA networks
379 -- 389Muhammed Nauman Qureshi, Moazzam Islam Tiwana, Majed Haddad. Distributed self optimization techniques for heterogeneous network environments using active antenna tilt systems
391 -- 404Saeid Akhavan Bitaghsir, Ahmad Khonsari. Modeling and improving the throughput of vehicular networks using cache enabled RSUs
405 -- 415Nadhir Ben Halima, Hatem Boujemâa. Round robin, distributed and centralized relay selection for cognitive radio networks in the presence of Nakagami fading channels
417 -- 434Emmanuel Ahene, Chunhua Jin, Fagen Li. Certificateless deniably authenticated encryption and its application to e-voting system
435 -- 446Shoaib Mughal, Fengfan Yang, Hongjun Xu, Rahim Umar. Coded cooperative spatial modulation based on multi-level construction of polar code
447 -- 489Gilberto Fernandes Jr., Joel J. P. C. Rodrigues, Luiz Fernando Carvalho, Jalal Al-Muhtadi, Mario Lemes Proença Jr.. A comprehensive survey on network anomaly detection

Volume 70, Issue 2

159 -- 169Mohsen Maadani. Reanalyzing a simplified Markov model for the low-density P2P wireless sensor and actuator networks
171 -- 183Ali Mohammad Khodadoust, Javad Khodadoust. Generalized carrier to interference ratio analysis for shotgun cellular systems in multiple dimensions over composite Rayleigh-Lognormal (Suzuki) fading
185 -- 191Minjoong Rim, Seungyeob Chae, Chung G. Kang. MIMO receivers considering preamble collisions for grant-free random access in machine type communication systems
193 -- 229Suresh V. Limkar, Rakesh Kumar Jha. Computing over encrypted spatial data generated by IoT
231 -- 244Ritwik Haldar, Ashraf Hossain, Kirtan Gopal Panda. Estimation of event loss duration for energy harvested wireless body sensor node
245 -- 262Mohammad Kamrul Hasan, Ahmad Fadzil Ismail, Shayla Islam, Wahidah Hashim, Musse Mohamud Ahmed, Imran Memon. A Novel HGBBDSA-CTI Approach for Subcarrier Allocation in Heterogeneous Network
263 -- 276Andrzej Chydzinski, Dominik Samociuk. Burst ratio in a single-server queue
277 -- 293Ricardo Tadashi Kobayashi, Alex Miyamoto Mussi, Taufik Abrão. BER minimisation via optimal power allocation and eigenbeamforming in MIMO systems
295 -- 308Festus Kehinde Ojo, Damilare Oluwole Akande, Mohd Fadzli Mohd Salleh. An overview of RF energy harvesting and information transmission in cooperative communication networks
309 -- 320Her-Chang Tsai. Iterative multiuser detector-decoding for nonbinary LDPC coded multicarrier MFSK systems

Volume 70, Issue 1

1 -- 0Muhammad Khurram Khan. A new journey in the new year
3 -- 12Prabina Pattanayak, Preetam Kumar. Combined user and antenna scheduling scheme for MIMO-OFDM networks
13 -- 25Tomohiro Matsuno, Bijoy Chand Chatterjee, Nattapong Kitsuwan, Eiji Oki, Malathi Veeraraghavan, Satoru Okamoto, Naoaki Yamanaka. Designing a Hadoop system based on computational resources and network delay for wide area networks
27 -- 35P. G. Sudheesh, Maurizio Magarini, P. Muthuchidambaranathan. Multiple-high altitude platforms aided system architecture for achieving maximum last mile capacity in satellite communication
37 -- 53Mohammad Nour Hindia, Faizan Qamar, Mohammad B. Majed, Tharek Abd Rahman, Iraj S. Amiri. Enabling remote-control for the power sub-stations over LTE-A networks
55 -- 66Joaquín Cortez González, Miguel Bazdresch, Julio C. Ramírez-Pacheco, Ramon R. Palacio, Erica Ruiz-Ibarra. Low complexity maximum-likelihood detector for DSTTD architecture based on the QRD-M algorithm
67 -- 79Naeem Ahmad, S. Zeeshan Hussain. Analytical comparisons of query-broadcast repealing schemes in MANETs
81 -- 96Leila Kheroua, Samira Moussaoui, Mohamed Guerroumi, Al-Sakib Khan Pathan. Two energy and time-efficient data dissemination protocols for large-scale wireless sensor networks
97 -- 104Nadhir Ben Halima, Hatem Boujemâa. 3D WLS hybrid and non hybrid localization using TOA, TDOA, azimuth and elevation
105 -- 121Soraya Farzi, Saleh Yousefi, Jamshid Bagherzadeh, Behdis Eslamnour. Zone-based load balancing in two-tier heterogeneous cellular networks: a game theoretic approach
123 -- 140Saim Bin Abdul Khaliq, Muhammad Faisal Amjad, Haider Abbas, Narmeen Shafqat, Hammad Afzal. Defence against PUE attacks in ad hoc cognitive radio networks: a mean field game approach
141 -- 158Lucian Trifina, Daniela G. Tarniceriu. Correction to: The number of different true permutation polynomial based interleavers under Zhao and Fan sufficient conditions