Digital Library
Vol. 11, No. 5, May 30, 2017
[Regular Papers]
Internet & Communications
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Fog Computing
- Service Architecture
- Cloud Computing, Internet of Things, Distributed computing, Grid computing
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Secrecy outage performance
- Cooperative communications
- relay selection
- decode-and-forward
- Nakagami-m fading
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Wireless Sensor Networks
- pipeline-forwarding
- cross-layer
- Medium Access Control protocol
- routing integrated
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Multimedia
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Noisy label
- discriminative least squares regression (DLSR)
- noisy label based discriminative least squares regression algorithm (NLDLSR)
- pattern recognition
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Internet Security
Md. Abdullah Al Rahat Kutubi,
Kazi Md. Rokibul Alam,
Rafaf Tahsin,
G. G. Md. Nawaz Ali,
Peter Han Joo Chong,
Yasuhiko Morimoto
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- cryptanalysis
- Crypton
- mCrypton
- meet-in-the-middle attack
- generalized δ-set
- differential enumeration
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Finite Field
- cryptography
- polynomial basis
- Application Specific Integrated Circuit
- Area-delay product
- Field programmable gate arrays
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- key generation
- wireless channel reciprocity
- discrete cosine transformation
- received signal strength
- heterogeneous devices
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
- Fuzzy identity based signature
- lattice assumption
- existentially unforgeable
- post-quantum communication
- Biometric Authentication
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
Archives