Digital Library
Vol. 11, No. 5, May 30, 2017
[Regular Papers]
Internet & Communications
10.3837/tiis.2017.05.001
- Fog Computing
- Service Architecture
- Cloud Computing, Internet of Things, Distributed computing, Grid computing
10.3837/tiis.2017.05.002
10.3837/tiis.2017.05.003
10.3837/tiis.2017.05.004
10.3837/tiis.2017.05.005
10.3837/tiis.2017.05.006
- Secrecy outage performance
- Cooperative communications
- relay selection
- decode-and-forward
- Nakagami-m fading
10.3837/tiis.2017.05.007
- Wireless Sensor Networks
- pipeline-forwarding
- cross-layer
- Medium Access Control protocol
- routing integrated
10.3837/tiis.2017.05.008
10.3837/tiis.2017.05.009
10.3837/tiis.2017.05.010
10.3837/tiis.2017.05.011
Multimedia
10.3837/tiis.2017.05.012
- Noisy label
- discriminative least squares regression (DLSR)
- noisy label based discriminative least squares regression algorithm (NLDLSR)
- pattern recognition
10.3837/tiis.2017.05.013
10.3837/tiis.2017.05.014
10.3837/tiis.2017.05.015
10.3837/tiis.2017.05.016
10.3837/tiis.2017.05.017
Internet Security
Md. Abdullah Al Rahat Kutubi,
Kazi Md. Rokibul Alam,
Rafaf Tahsin,
G. G. Md. Nawaz Ali,
Peter Han Joo Chong,
Yasuhiko Morimoto
10.3837/tiis.2017.05.018
10.3837/tiis.2017.05.019
10.3837/tiis.2017.05.020
- cryptanalysis
- Crypton
- mCrypton
- meet-in-the-middle attack
- generalized δ-set
- differential enumeration
10.3837/tiis.2017.05.021
- Finite Field
- cryptography
- polynomial basis
- Application Specific Integrated Circuit
- Area-delay product
- Field programmable gate arrays
10.3837/tiis.2017.05.022
- key generation
- wireless channel reciprocity
- discrete cosine transformation
- received signal strength
- heterogeneous devices
10.3837/tiis.2017.05.023
10.3837/tiis.2017.05.024
10.3837/tiis.2017.05.025
- Fuzzy identity based signature
- lattice assumption
- existentially unforgeable
- post-quantum communication
- Biometric Authentication
10.3837/tiis.2017.05.026
10.3837/tiis.2017.05.027
Archives