International Journal of Ad Hoc and Ubiquitous Computing
2018 Vol.27 No.2
Pages | Title and author(s) |
81-92 | Enhancing lifetime of IPv6-based wireless sensor networks with address codingLeila Ben Saad; Bernard Tourancheau DOI: 10.1504/IJAHUC.2018.089578 |
93-107 | Applications nature aware virtual machine provisioning in cloudRaghavendra Achar; P. Santhi Thilagam DOI: 10.1504/IJAHUC.2018.089579 |
108-120 | Impersonation attack on CertificateLess key agreement protocolSuman Bala; Gaurav Sharma; Anil K. Verma DOI: 10.1504/IJAHUC.2018.089580 |
121-137 | Trust and reputation aware geographic routing method for wireless ad hoc networksP. Raghu Vamsi; Krishna Kant DOI: 10.1504/IJAHUC.2018.089581 |
138-155 | A novel biometric-based password authentication scheme for client-server environment using ECC and fuzzy extractorSK Hafizul Islam; Ashok Kumar Das; Muhammad Khurram Khan DOI: 10.1504/IJAHUC.2018.089583 |