


default search action
International Journal of Information and Communication Technology, Volume 12
Volume 12, Numbers 1/2, 2018
- Xiaoqing Tan, Xiaoqian Zhang:

Quantum information exchange protocol associated with the quantum cloud. 1-15 - Zhengjun Jing

, Guoping Jiang, Chunsheng Gu:
A novel identity-based anonymous authentication scheme from multilinear maps. 16-30 - Qiu-Yu Zhang, Peng-Fei Xing, Yi-Bo Huang, Rui-Hong Dong, Zhong-Ping Yang:

An efficient speech perceptual hashing authentication algorithm based on DWT and symmetric ternary string. 31-50 - Ankur Mishra, Brij B. Gupta

:
Intelligent phishing detection system using similarity matching algorithms. 51-73 - Syam Kumar Pasupuleti:

Effective and secure data storage in multi-cloud storage architectures. 74-97 - Yang Jing, Zeng Hui, Huang Jiangping:

Grey neural network prediction model based on fruit fly optimisation algorithm and its application. 98-112 - Jianhong Zhang, Xubing Zhao, Weina Zhen:

S2PAD: secure self-certified public auditing for data integrity in cloud storage and its extension. 113-130 - S. Anthoniraj, S. Saraswathi:

Frequent failure monitoring and reporting in virtualisation environment using backing algorithm technique. 131-142 - Xiaoli Gong, Zhaoyang Shao, Qi Du, Aimin Yu, Jin Zhang:

Performance overhead analysis of virtualisation on ARM. 143-161 - Hang Yang, Peng Li, Xiaobin Guo, Huajun Chen, Zhiqiang Lin:

A review: The effects of imperfect data on incremental decision tree. 162-174 - Wei Zhang:

The design of strain sensitising of high-sensitivity SAW sensor based on FBG. 175-185 - Ali Kanso, Abdelouahed Gherbi

, Yves Lemieux:
Middleware-managed high availability for cloud applications. 186-208 - Guoqiang Gao, Ruixuan Li, Zhiyong Xu:

Mimir: a term-distributed retrieval system for secret documents. 209-228
Volume 12, Numbers 3/4, 2018
- Aris M. Ouksel, Doug Lundquist:

A hybrid ad hoc networking protocol for disaster recovery resource management. 232-245 - Mohamed Hefeida, Ashfaq A. Khokhar:

Medium access control in wireless sensor networks: a survey. 246-270 - Bahia Zebbane, Manel Chenait, Chafika Benzaid, Nadjib Badache:

RTCP: a redundancy aware topology control protocol for wireless sensor networks. 271-298 - Adnan Fida, Nor Tuah Jaidi, Trung Dung Ngo:

Coordinated route reconfiguration for throughput optimisation under Rician fading channel. 299-318 - Nawel Bendimerad, Kechar Bouabdellah:

Coverage enhancement with occlusion avoidance in networked rotational video sensors for post-disaster management. 319-344 - Tiago Badre Marino, Maria Luiza Machado Campos, Marcos R. S. Borges, John G. Breslin, Maciej Dabrowski:

Architecture for gathering and integrating collaborative information for decision support in emergency situations. 345-363 - Karima Ait Abdelouhab, Djilali Idoughi, Christophe Kolski:

A framework combining agile, user-centred design and service-oriented architecture approaches for collaborative disaster management system design. 364-392 - Djalal Hedjazi:

Constructing collective competence: a new CSCW-based approach. 393-416

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














