![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Tripartite evolutionary game in the process of network attack and defense
At present, confrontations in cyberspace are becoming increasingly fierce, and network attacks and defenses have become the main form of confrontation between parties in cyberspace. The maximum benefit can be ...
-
Article
A mutual authentication scheme in VANET providing vehicular anonymity and tracking
Nowadays, the intelligent transportation system (ITS) has developed prosperously all over the world. As a key technique in ITS, vehicular ad-hoc network (VANET) supports fast transmitting while bringing securi...
-
Article
A new authentication and key agreement protocol for 5G wireless networks
Authentication and key agreement (AKA) protocol is an important security mechanism for access services in mobile communication systems. The 3GPP group has standardized the AKA protocol for 5G mobile communicat...
-
Article
Foreword to the special issue on intelligent vehicular network and applications
-
Chapter and Conference Paper
Simulation Research on Core Control Parameters of Electromagnetic Force in Electromagnetic Riveting System
To achieve effective control of the riveting force in the electromagnetic riveting system and improve riveting efficiency, a theoretical analysis of electromagnetic riveting force is given. The Ansoft Maxwell ...
-
Article
Performance analysis of cellular networks with mobile relays under different modes
With the popularity of smart phones and tablets, people make intensive use of these devices on public transport. The deployment of mobile relays on public transport may increase the quality of mobile services....
-
Article
RFID-based mobility for seamless personal communication system in cloud computing
The Voice over Internet Protocol (VoIP) was developed for making telephone calls using an Internet connection instead of a regular (or analog) phone line. However, traditional VoIP technologies have many disad...
-
Article
Navigation-based self-optimization handover mechanism for mobile relay stations in WiMAX networks
Organic Computing has similar characteristics of organism which can be self-adjustment for a variety of conditions. Moreover, during the wireless communication technological evolution progress, WiMAX (Worldwid...
-
Article
Communication and organizational social networks: a simulation model
Recent management research has evidenced the significance of organizational social networks, and communication is believed to impact the interpersonal relationships. However, we have little knowledge on how co...
-
Article
Implementation of SOPC based Telecom & Datacom for monitoring wireless sensor networks
In this paper, we used SOPC to develop WSN Control Center to be monitored by Telecom and Datacom. We design the Wireless/Wired Board to receive sensing data from wireless sensor network and through DM9000A Eth...
-
Article
A new metric model for trustworthiness of softwares
As people depend more and more on softwares, there has been an increasing demand for the trustworthiness of the software. To measure the trustworthiness of software, we need to design appropriate trustworthy m...
-
Article
Improving protocol capacity by scheduling random access on WLANs
The MAC protocol is important, especially for wireless LAN because of limited bandwidth. A great deal of research has been carried out and some of proposed schemes are effective. Specifically, considerable eff...
-
Article
MTRA: An on-line hose-model VPN provisioning algorithm
Virtual private networks (VPNs) provide customers with a secure and manageable communication environment. The allocation of bandwidth for VPNs to meet the requirements specified by customers is now one of the ...