Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/nsyss/nsyss2016.bht:"
@inproceedings{DBLP:conf/nsyss/AhmadKCI16, author = {Iftakhar Ahmad and Sinthia Kabir and Tanzila Choudhury and A. B. M. Alim Al Islam}, title = {Enhancing security in specialized use of mobile {IP}}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400695}, doi = {10.1109/NSYSS.2016.7400695}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/AhmadKCI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/AhmedAKHGS16, author = {Nova Ahmed and Md. Abul Kalam Azad and Mahmudur Rahman Khan and Ahsan Habib and Shuvashish Ghosh and Sabiha Shahid}, title = {ShonaBondhu: a cloud based system to handle flash flood}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400688}, doi = {10.1109/NSYSS.2016.7400688}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/AhmedAKHGS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/AkterIR16, author = {Mamtaj Akter and Alimul Islam and Ashikur Rahman}, title = {Fault tolerant optimized broadcast for wireless Ad-Hoc networks}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400690}, doi = {10.1109/NSYSS.2016.7400690}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/AkterIR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/AkterRI16, author = {Sajeda Akter and Farzana Rahman and A. B. M. Alim Al Islam}, title = {Securing app distribution process of iOS exploiting the notion of authentic update}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400689}, doi = {10.1109/NSYSS.2016.7400689}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/AkterRI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/AlamAFM16, author = {Khairul Alam and Kazi Md. Rokibul Alam and Omar Faruq and Yasuhiko Morimoto}, title = {A comparison between {RSA} and ElGamal based untraceable blind signature schemes}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--4}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400705}, doi = {10.1109/NSYSS.2016.7400705}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/AlamAFM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/HossenR16, author = {Sharif Hossen and Muhammad Sajjadur Rahim}, title = {Impact of mobile nodes for few mobility models on delay-tolerant network routing protocols}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400704}, doi = {10.1109/NSYSS.2016.7400704}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/HossenR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/Islam16, author = {Nazmul Islam}, title = {Certificate revocation in vehicular Ad Hoc networks: a novel approach}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400703}, doi = {10.1109/NSYSS.2016.7400703}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/Islam16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/IslamRI16, author = {Mofijul Islam and Md. Abdur Razzaque and Jahidul Islam}, title = {A genetic algorithm for virtual machine migration in heterogeneous mobile cloud computing}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400696}, doi = {10.1109/NSYSS.2016.7400696}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/IslamRI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/JaigirdarI16, author = {Fariha Tasmin Jaigirdar and Mohammad Mahfuzul Islam}, title = {A new cost-effective approach for battlefield surveillance in wireless sensor networks}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400694}, doi = {10.1109/NSYSS.2016.7400694}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/JaigirdarI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/KabirCI16, author = {Kazi Sinthia Kabir and Tusher Chakraborty and A. B. M. Alim Al Islam}, title = {Supercrypt: a technique for quantum cryptography through simultaneously improving both security level and data rate}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400693}, doi = {10.1109/NSYSS.2016.7400693}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/KabirCI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/KamalI16, author = {A. H. M. Kamal and Mohammad Mahfuzul Islam}, title = {Enhancing the embedding payload by handling the affair of association and mapping of block pixels through prediction errors histogram}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400691}, doi = {10.1109/NSYSS.2016.7400691}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/KamalI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/KhanH16, author = {Shahidul Islam Khan and Abu Sayed Md. Latiful Hoque}, title = {Privacy and security problems of national health data warehouse: a convenient solution for developing countries}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400708}, doi = {10.1109/NSYSS.2016.7400708}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsyss/KhanH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/OishiMA16, author = {Nusrat Jahan Oishi and Arafin Mahamud and Asaduzzaman}, title = {Short paper: enhancing Wi-Fi security using a hybrid algorithm of blowfish and {RC6}}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400706}, doi = {10.1109/NSYSS.2016.7400706}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nsyss/OishiMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/RahmanK16, author = {Marufur Rahman and Rezaul Karim}, title = {Comparative study of different methods of social network analysis and visualization}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400702}, doi = {10.1109/NSYSS.2016.7400702}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/RahmanK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/RahmanPR16, author = {Saidur Rahman and Anika Anzum Prima and Md. Abdur Razzaque}, title = {Optimal allocation of 3G budget for smartphones running heterogeneous applications}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400698}, doi = {10.1109/NSYSS.2016.7400698}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/RahmanPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/RahmanURK16, author = {Mohammad Saifur Rahman and Yusuf Sarwar Uddin and M. Sohel Rahman and M. Kaykobad}, title = {Using adaptive heartbeat rate on long-lived {TCP} connections}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--9}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400700}, doi = {10.1109/NSYSS.2016.7400700}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/RahmanURK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/RaselA16, author = {Annajiat Alim Rasel and Mohammed Eunus Ali}, title = {UProve2: privacy-aware, scalable, ubiquitous provenance to enhance file search}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400709}, doi = {10.1109/NSYSS.2016.7400709}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/RaselA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/SakinR16, author = {Sayef Azad Sakin and Md. Abdur Razzaque}, title = {Game theoretic downlink resource scheduling for self-coexisting cognitive radio networks}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400697}, doi = {10.1109/NSYSS.2016.7400697}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/SakinR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/SarkerNR16, author = {Sujan Sarker and Amit Kumar Nath and Md. Abdur Razzaque}, title = {Tradeoffs between sensing quality and energy efficiency for context monitoring applications}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--7}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400699}, doi = {10.1109/NSYSS.2016.7400699}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/SarkerNR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/SarminBI16, author = {Saiyma Sarmin and Saurabh Bagchi and Alim Al Islam}, title = {Chameleon: defending secret information from eavesdropping over physical environment}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--5}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400707}, doi = {10.1109/NSYSS.2016.7400707}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/SarminBI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/SohanHHII16, author = {Tareq Anwer Sohan and Hasib Hamidul Haque and Asif Hasan and Jahidul Islam and Alim Al Islam}, title = {A graph coloring based dynamic channel assignment algorithm for cognitive radio vehicular Ad Hoc networks}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--8}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400692}, doi = {10.1109/NSYSS.2016.7400692}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/SohanHHII16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nsyss/SultanaNS16, author = {Afroza Sultana and Mahmuda Naznin and Rifat Shahriyar}, title = {Conflicting goal constrained architecture of a heterogeneous mobile sensor network}, booktitle = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/NSysS.2016.7400701}, doi = {10.1109/NSYSS.2016.7400701}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/SultanaNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nsyss/2016, title = {International Conference on Networking Systems and Security, NSysS 2016, Dhaka, Bangladesh, January 7-9, 2016}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7400673/proceeding}, isbn = {978-1-5090-0203-0}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nsyss/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.