1 | -- | 7 | Homero Toral-Cruz, Albena D. Mihovska, Miroslav Voznak, Kamaljit I. Lakhtaria, Robert Bestak. Research Trends and Challenges for Network-Based ICT Systems |
9 | -- | 27 | Chia-Hung Wei, Ray-Guang Cheng, You-Shin Lin. Analysis of Slotted-Access-Based Channel Access Control Protocol for LTE-Advanced Networks |
29 | -- | 48 | Pengbo Si, F. Richard Yu, Ruizhe Yang, Yanhua Zhang. Navigation Data-Assisted Opportunistic Spectrum Scheduling for Network-Based UAV Systems: A Parallel Restless Bandits Formulation |
49 | -- | 62 | Mindaugas Kurmis, Arunas Andziulis, Dale Dzemydiene, Sergej Jakovlev, Miroslav Voznak, Gediminas Gricius. Cooperative Context Data Acquisition and Dissemination for Situation Identification in Vehicular Communication Networks |
63 | -- | 76 | Filip Rezac, Miroslav Voznak, Karel Tomala. Voice Messaging System as a Form of Distribution of an Urgent Information |
77 | -- | 99 | Al-Sakib Khan Pathan, Mohssen M. Z. E. Mohammed. Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body |
101 | -- | 136 | Slavyana Kasabova, Miroslav Gechev, Vladislav Vasilev, Albena Mihovska, Vladimir Poulkov, Ramjee Prasad. On Modeling the Psychology of Wireless Node Interactions in the Context of Internet of Things |
137 | -- | 149 | Stanislav Klucik, Erik Chromy, Ivan Baronak. Model to Increase the Number of Output States of a Random Variable Using a Histogram Based PDF |
151 | -- | 177 | Djallel Eddine Boubiche, Azeddine Bilami, Sabrina Boubiche, Faouzi Hidoussi. A Cross-Layer Communication Protocol with Transmission Power Adjustment for Energy Saving in Multi-hop MhWSNs |
179 | -- | 205 | Aarti Jain, B. V. Ramana Reddy. Ant Colony Optimization Based Orthogonal Directional Proactive-Reactive Routing Protocol for Wireless Sensor Networks |
207 | -- | 224 | Faouzi Hidoussi, Homero Toral-Cruz, Djallel Eddine Boubiche, Kamaljit I. Lakhtaria, Albena Mihovska, Miroslav Voznak. Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks |
225 | -- | 240 | Baojun Huang, Muhammad Khurram Khan, Libing Wu, Fahad T. Bin Muhaya, Debiao He. An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography |
241 | -- | 261 | David Deebak Bakkiam, Rajappa Muthaiah, Karupuswamy Thenmozhi, Pitchai Iyer Swaminathan. A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System |
263 | -- | 288 | Xiong Li, Junguo Liao, Saru Kumari, Wei Liang, Fan Wu, Muhammad Khurram Khan. A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design |
289 | -- | 304 | Rafael Martínez-Peláez, Homero Toral-Cruz, Joel Ruiz, Pablo Velarde-Alvarado. P2PM-pay: Person to Person Mobile Payment Scheme Controlled by Expiration Date |
305 | -- | 323 | P. Karthigaikumar, N. Anitha Christy, N. M. Siva Mangai. PSP CO2: An Efficient Hardware Architecture for AES Algorithm for High Throughput |