Novel authentication procedures for preventing unauthorized access in social networks M. Milton JoeB. Ramakrishnan OriginalPaper 19 January 2016 Pages: 833 - 843
Concurrently deniable ring authentication and its application to LBS in VANETs Shengke ZengYong ChenMingxing He OriginalPaper 21 January 2016 Pages: 844 - 856
An authenticated group key transfer protocol using elliptic curve cryptography Priyanka JaiswalSachin Tripathi OriginalPaper 10 February 2016 Pages: 857 - 864
Computational data privacy in wireless networks Jian WangZhipeng WuHeekuck Oh OriginalPaper 25 January 2016 Pages: 865 - 873
A fault tolerant peer-to-peer spatial data structure Pouya BisadiZahra MirikharajiBradford G. Nickerson OriginalPaper 15 February 2016 Pages: 874 - 886
Low-complexity time synchronization for energy-constrained wireless sensor networks: Dual-Clock delayed-message approach Yao-Ren LeeWen-Long (William) Chin OriginalPaper 02 February 2016 Pages: 887 - 896
QMRPRNS: Design of QoS multicast routing protocol using reliable node selection scheme for MANETs Ajay Kumar YadavSachin Tripathi OriginalPaper 27 February 2016 Pages: 897 - 909
MobiStore: A system for efficient mobile P2P data sharing Mohammad A KhanLaurent YehCristian Borcea OriginalPaper 19 March 2016 Pages: 910 - 924
Energy-optimal collaborative file distribution in wired networks Kshitiz VermaGianluca RizzoAlberto García-Martínez OriginalPaper 19 April 2016 Pages: 925 - 944
Joint TAS and power allocation for D2D cooperative networks Lingwei XuHao ZhangT. Aaron Gulliver OriginalPaper 04 April 2016 Pages: 945 - 953
HyCube: A distributed hash table based on a variable metric Artur Olszak OriginalPaper Open access 22 April 2016 Pages: 954 - 982
The IoT electric business model: Using blockchain technology for the internet of things Yu ZhangJiangtao Wen OriginalPaper 13 April 2016 Pages: 983 - 994
VCSE: Verifiable conjunctive keywords search over encrypted data without secure-channel Yinbin MiaoJianfeng MaCunbo Lu OriginalPaper 05 May 2016 Pages: 995 - 1007
TAPCS: Traffic-aware pseudonym changing strategy for VANETs Abdelwahab BoualouacheSamira Moussaoui OriginalPaper 22 April 2016 Pages: 1008 - 1020
Improving the reliability of wireless data communication in Smart Grid NAN Hossein Mohammadi NejadNaser MovahhediniaMohammad Reza Khayyambashi OriginalPaper 10 May 2016 Pages: 1021 - 1033
Applying location estimation for reliable routing in tactical unmanned ground vehicle networks Preetha ThulasiramanGrace A. ClarkTimothy M. Beach OriginalPaper 07 May 2016 Pages: 1034 - 1050
Quality enhancement of video on demand implementation in peer-to-peer networks by optimum chunk length in the BitTorrent Narges Mohammadi SarbandMohammad Reza KhayyambashiNaser Movahedinia OriginalPaper 26 May 2016 Pages: 1051 - 1062
Minimizing mobile sensor movements to form a line K-coverage Yang WangShuang WuGuihai Chen OriginalPaper 10 June 2016 Pages: 1063 - 1078
Protecting against malicious and selective forwarding attacks for P2P search & retrieval system Yung-Ting Chuang OriginalPaper 24 August 2016 Pages: 1079 - 1100
Uncertainty analysis framework for trust based routing in MANET Sandeep A. ThoratPrakash J. Kulkarni OriginalPaper 07 October 2016 Pages: 1101 - 1111