Abstract is missing.
- Fault tolerant optimized broadcast for wireless Ad-Hoc networksMamtaj Akter, Alimul Islam, Ashikur Rahman. 1-9 [doi]
- Optimal allocation of 3G budget for smartphones running heterogeneous applicationsSaidur Rahman, Anika Anzum Prima, Md. Abdur Razzaque. 1-6 [doi]
- Impact of mobile nodes for few mobility models on delay-tolerant network routing protocolsSharif Hossen, Muhammad Sajjadur Rahim. 1-6 [doi]
- Enhancing the embedding payload by handling the affair of association and mapping of block pixels through prediction errors histogramA. H. M. Kamal, Mohammad Mahfuzul Islam. 1-8 [doi]
- Tradeoffs between sensing quality and energy efficiency for context monitoring applicationsSujan Sarker, Amit Kumar Nath, Md. Abdur Razzaque. 1-7 [doi]
- Chameleon: defending secret information from eavesdropping over physical environmentSaiyma Sarmin, Saurabh Bagchi, Alim Al Islam. 1-5 [doi]
- A new cost-effective approach for battlefield surveillance in wireless sensor networksFariha Tasmin Jaigirdar, Mohammad Mahfuzul Islam. 1-6 [doi]
- Certificate revocation in vehicular Ad Hoc networks: a novel approachNazmul Islam. 1-5 [doi]
- Enhancing security in specialized use of mobile IPIftakhar Ahmad, Sinthia Kabir, Tanzila Choudhury, A. B. M. Alim Al Islam. 1-9 [doi]
- Game theoretic downlink resource scheduling for self-coexisting cognitive radio networksSayef Azad Sakin, Md. Abdur Razzaque. 1-7 [doi]
- Securing app distribution process of iOS exploiting the notion of authentic updateSajeda Akter, Farzana Rahman, A. B. M. Alim Al Islam. 1-8 [doi]
- Using adaptive heartbeat rate on long-lived TCP connectionsM. Saifur Rahman, Yusuf Sarwar Uddin, M. Sohel Rahman, M. Kaykobad. 1-9 [doi]
- Conflicting goal constrained architecture of a heterogeneous mobile sensor networkAfroza Sultana, Mahmuda Naznin, Rifat Shahriyar. 1-6 [doi]
- A graph coloring based dynamic channel assignment algorithm for cognitive radio vehicular Ad Hoc networksTareq Anwer Sohan, Hasib Hamidul Haque, Asif Hasan, Jahidul Islam, Alim Al Islam. 1-8 [doi]
- UProve2: privacy-aware, scalable, ubiquitous provenance to enhance file searchAnnajiat Alim Rasel, Mohammed Eunus Ali. 1-5 [doi]
- ShonaBondhu: a cloud based system to handle flash floodNova Ahmed, A. K. Azad, Mahmudur Rahman Khan, Ahsan Habib, Shuvashish Ghosh, Sabiha Shahid. 1-6 [doi]
- Comparative study of different methods of social network analysis and visualizationMarufur Rahman, Rezaul Karim. 1-7 [doi]
- A genetic algorithm for virtual machine migration in heterogeneous mobile cloud computingMofijul Islam, Md. Abdur Razzaque, Jahidul Islam. 1-6 [doi]
- Supercrypt: a technique for quantum cryptography through simultaneously improving both security level and data rateKazi Sinthia Kabir, Tusher Chakraborty, A. B. M. Alim Al Islam. 1-9 [doi]
- A comparison between RSA and ElGamal based untraceable blind signature schemesKhairul Alam, Kazi Rokibul Alam, Omar Faruq, Yasuhiko Morimoto. 1-4 [doi]
- Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and RC6Nusrat Jahan Oishi, Arafin Mahamud, Asaduzzaman. 1-5 [doi]
- Privacy and security problems of national health data warehouse: a convenient solution for developing countriesShahidul Islam Khan, Abu Sayed Latiful Hoque. 1-6 [doi]