Linked e-resources

Details

Intro; Welcome Message from WIDECOM 2019 General Chair; Welcome Message from the WIDECOM 2019 Program Cochairs; WIDECOM 2019 Organizing Committee; WIDECOM 2019 Keynote Talks; From WSNs to VANETs: Paradigms, Technologies, and Open Research Issues for Challenged Networks; Making Sense(s) of Smart Contracts in a Connected World; WIDECOM 2019 Tutorials; Tutorial 1: High-Speed Cryptography; Tutorial 2: Understanding the Key Pre-distribution Aspect of Linear Wireless Sensor Network; Tutorial 3: Efficient Cryptographic Algorithms for Securing Passwords; Contents

1 Performance Evaluation of G.711 and GSM Codecs on VoIP Applications Using OSPF and RIP Routing Protocols1.1 Introduction; 1.2 Background; 1.2.1 Voice Encoding Codec; 1.2.2 Routing Protocols; 1.3 Related Work; 1.4 Network Model; 1.4.1 Network Topology; 1.4.2 Configuration Parameters; 1.4.3 Routing Scenarios; 1.5 Simulation Results; 1.5.1 Traffic Sent; 1.5.2 Traffic Received; 1.5.3 Jitter; 1.5.4 End-to-End Delay; 1.5.5 Packet Delay Variation; 1.5.6 Mean Opinion Score; 1.6 Conclusion; References; 2 Cyclic Redundancy Check Based Data Authenticationin Opportunistic Networks; 2.1 Introduction

2.2 Related Work2.3 Overview of CRC (Cyclic Redundancy Check); 2.4 Proposed Work; 2.4.1 Assumptions; 2.4.2 Authentication Key; 2.4.3 Algorithm; 2.5 Results and Analysis; 2.6 Conclusion; References; 3 Hybrid Cryptographic Based Approach for Privacy Preservation in Location-Based Services; 3.1 Introduction; 3.2 Literature Survey; 3.2.1 Categorization of Crypto-Based Privacy Model for LBS; 3.2.1.1 TTP Free Schema; 3.3 Motivation of Proposed Approach; 3.4 Experimental Results and Evaluation; 3.4.1 Datasets; 3.4.2 Density Based Clustering Algorithms; 3.4.3 Results; 3.5 Conclusion; References

4 Design of Energy-Aware PRoPHET and Spray-and-Wait Routing Protocols for Opportunistic Networks4.1 Introduction; 4.2 Background and Related Work; 4.2.1 PRoPHET; 4.2.2 Spray-and-Wait; 4.2.3 Related Work; 4.3 Proposed EPRoPHET Routing Protocol; 4.3.1 EPRoPHET; 4.3.2 ES&W Routing Protocol; 4.4 Performance Evaluation; 4.4.1 Simulation Parameters; 4.4.2 Performance Matrix; 4.5 Simulation Results; 4.5.1 Comparison of EPRoPHET and PRoPHET; 4.5.2 Comparison of S&W and ES&W Routing Protocol; 4.5.3 Comparison of ES&W and EPRoPHET Routing Protocol; 4.6 Conclusion; References

5 An Asymmetric RSA-Based Security Approach for Opportunistic IoT5.1 Introduction; 5.2 Literature Review; 5.3 Proposed Work; 5.3.1 A Secure Location Prediction-Based Forwarding Scheme for Opportunistic Internet of Things; 5.4 Simulation Results; 5.5 Conclusion; References; 6 Performance Analysis of A*-Based Hop Selection Techniquein Opportunistic Networks Through Movement Mobility Models; 6.1 Introduction; 6.2 Related Work and Background; 6.2.1 A* Search-Based Next Hop Selection Routing Protocol: A*OR; 6.2.2 Random Way-Point Model; 6.2.3 Shortest Path Map-Based Movement Model

Browse Subjects

Show more subjects...

Statistics

from
to
Export