Search dblp for Publications

export results for "toc:db/conf/nsyss/nsyss2016.bht:"

 download as .bib file

@inproceedings{DBLP:conf/nsyss/AhmadKCI16,
  author       = {Iftakhar Ahmad and
                  Sinthia Kabir and
                  Tanzila Choudhury and
                  A. B. M. Alim Al Islam},
  title        = {Enhancing security in specialized use of mobile {IP}},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400695},
  doi          = {10.1109/NSYSS.2016.7400695},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/AhmadKCI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/AhmedAKHGS16,
  author       = {Nova Ahmed and
                  Md. Abul Kalam Azad and
                  Mahmudur Rahman Khan and
                  Ahsan Habib and
                  Shuvashish Ghosh and
                  Sabiha Shahid},
  title        = {ShonaBondhu: a cloud based system to handle flash flood},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400688},
  doi          = {10.1109/NSYSS.2016.7400688},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/AhmedAKHGS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/AkterIR16,
  author       = {Mamtaj Akter and
                  Alimul Islam and
                  Ashikur Rahman},
  title        = {Fault tolerant optimized broadcast for wireless Ad-Hoc networks},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400690},
  doi          = {10.1109/NSYSS.2016.7400690},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/AkterIR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/AkterRI16,
  author       = {Sajeda Akter and
                  Farzana Rahman and
                  A. B. M. Alim Al Islam},
  title        = {Securing app distribution process of iOS exploiting the notion of
                  authentic update},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400689},
  doi          = {10.1109/NSYSS.2016.7400689},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/AkterRI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/AlamAFM16,
  author       = {Khairul Alam and
                  Kazi Md. Rokibul Alam and
                  Omar Faruq and
                  Yasuhiko Morimoto},
  title        = {A comparison between {RSA} and ElGamal based untraceable blind signature
                  schemes},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400705},
  doi          = {10.1109/NSYSS.2016.7400705},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/AlamAFM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/HossenR16,
  author       = {Sharif Hossen and
                  Muhammad Sajjadur Rahim},
  title        = {Impact of mobile nodes for few mobility models on delay-tolerant network
                  routing protocols},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400704},
  doi          = {10.1109/NSYSS.2016.7400704},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/HossenR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/Islam16,
  author       = {Nazmul Islam},
  title        = {Certificate revocation in vehicular Ad Hoc networks: a novel approach},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400703},
  doi          = {10.1109/NSYSS.2016.7400703},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/Islam16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/IslamRI16,
  author       = {Mofijul Islam and
                  Md. Abdur Razzaque and
                  Jahidul Islam},
  title        = {A genetic algorithm for virtual machine migration in heterogeneous
                  mobile cloud computing},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400696},
  doi          = {10.1109/NSYSS.2016.7400696},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/IslamRI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/JaigirdarI16,
  author       = {Fariha Tasmin Jaigirdar and
                  Mohammad Mahfuzul Islam},
  title        = {A new cost-effective approach for battlefield surveillance in wireless
                  sensor networks},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400694},
  doi          = {10.1109/NSYSS.2016.7400694},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/JaigirdarI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/KabirCI16,
  author       = {Kazi Sinthia Kabir and
                  Tusher Chakraborty and
                  A. B. M. Alim Al Islam},
  title        = {Supercrypt: a technique for quantum cryptography through simultaneously
                  improving both security level and data rate},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400693},
  doi          = {10.1109/NSYSS.2016.7400693},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/KabirCI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/KamalI16,
  author       = {A. H. M. Kamal and
                  Mohammad Mahfuzul Islam},
  title        = {Enhancing the embedding payload by handling the affair of association
                  and mapping of block pixels through prediction errors histogram},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400691},
  doi          = {10.1109/NSYSS.2016.7400691},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/KamalI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/KhanH16,
  author       = {Shahidul Islam Khan and
                  Abu Sayed Md. Latiful Hoque},
  title        = {Privacy and security problems of national health data warehouse: a
                  convenient solution for developing countries},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400708},
  doi          = {10.1109/NSYSS.2016.7400708},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsyss/KhanH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/OishiMA16,
  author       = {Nusrat Jahan Oishi and
                  Arafin Mahamud and
                  Asaduzzaman},
  title        = {Short paper: enhancing Wi-Fi security using a hybrid algorithm of
                  blowfish and {RC6}},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400706},
  doi          = {10.1109/NSYSS.2016.7400706},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nsyss/OishiMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/RahmanK16,
  author       = {Marufur Rahman and
                  Rezaul Karim},
  title        = {Comparative study of different methods of social network analysis
                  and visualization},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400702},
  doi          = {10.1109/NSYSS.2016.7400702},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/RahmanK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/RahmanPR16,
  author       = {Saidur Rahman and
                  Anika Anzum Prima and
                  Md. Abdur Razzaque},
  title        = {Optimal allocation of 3G budget for smartphones running heterogeneous
                  applications},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400698},
  doi          = {10.1109/NSYSS.2016.7400698},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/RahmanPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/RahmanURK16,
  author       = {Mohammad Saifur Rahman and
                  Yusuf Sarwar Uddin and
                  M. Sohel Rahman and
                  M. Kaykobad},
  title        = {Using adaptive heartbeat rate on long-lived {TCP} connections},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400700},
  doi          = {10.1109/NSYSS.2016.7400700},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/RahmanURK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/RaselA16,
  author       = {Annajiat Alim Rasel and
                  Mohammed Eunus Ali},
  title        = {UProve2: privacy-aware, scalable, ubiquitous provenance to enhance
                  file search},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400709},
  doi          = {10.1109/NSYSS.2016.7400709},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/RaselA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/SakinR16,
  author       = {Sayef Azad Sakin and
                  Md. Abdur Razzaque},
  title        = {Game theoretic downlink resource scheduling for self-coexisting cognitive
                  radio networks},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400697},
  doi          = {10.1109/NSYSS.2016.7400697},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/SakinR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/SarkerNR16,
  author       = {Sujan Sarker and
                  Amit Kumar Nath and
                  Md. Abdur Razzaque},
  title        = {Tradeoffs between sensing quality and energy efficiency for context
                  monitoring applications},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400699},
  doi          = {10.1109/NSYSS.2016.7400699},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/SarkerNR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/SarminBI16,
  author       = {Saiyma Sarmin and
                  Saurabh Bagchi and
                  Alim Al Islam},
  title        = {Chameleon: defending secret information from eavesdropping over physical
                  environment},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400707},
  doi          = {10.1109/NSYSS.2016.7400707},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/SarminBI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/SohanHHII16,
  author       = {Tareq Anwer Sohan and
                  Hasib Hamidul Haque and
                  Asif Hasan and
                  Jahidul Islam and
                  Alim Al Islam},
  title        = {A graph coloring based dynamic channel assignment algorithm for cognitive
                  radio vehicular Ad Hoc networks},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400692},
  doi          = {10.1109/NSYSS.2016.7400692},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/SohanHHII16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nsyss/SultanaNS16,
  author       = {Afroza Sultana and
                  Mahmuda Naznin and
                  Rifat Shahriyar},
  title        = {Conflicting goal constrained architecture of a heterogeneous mobile
                  sensor network},
  booktitle    = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/NSysS.2016.7400701},
  doi          = {10.1109/NSYSS.2016.7400701},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/SultanaNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nsyss/2016,
  title        = {International Conference on Networking Systems and Security, NSysS
                  2016, Dhaka, Bangladesh, January 7-9, 2016},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7400673/proceeding},
  isbn         = {978-1-5090-0203-0},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nsyss/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics