Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
NANA
NANA 2017
Generate Citations
2017 International Conference on Networking and Network Applications (NaNA)
Oct. 16 2017 to Oct. 19 2017
Kathmandu City, Nepal
Table of Contents
[Title page I]
Freely available from IEEE.
pp. i-i
[Title page iii]
Freely available from IEEE.
pp. iii-iii
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Table of contents
Freely available from IEEE.
pp. v-x
Message from General Conference Chairs
Freely available from IEEE.
pp. xi-xi
Conference Organization
Freely available from IEEE.
pp. xii-xiii
Keynotes
Full-text access may be available. Sign in or learn about subscription options.
pp. xiv-xvi
Efficient (k, n) Secret Sharing Scheme Secure against k — 2 Cheaters
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-4
by
Lei Zhu
,
Yanxiao Liu
,
Yichuan Wang
,
Wenjiang Ji
,
Xinhong Hei
,
Quanzhu Yao
,
Xiaoyan Zhu
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 5-10
by
Teng Li
,
Jianfeng Ma
,
Cong Sun
,
Dawei Wei
,
Ning Xi
PADA: Privacy-Aware Data Aggregation with Efficient Communication for Power Injection in 5G Smart Grid Slice
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-16
by
Yinghui Zhang
,
Dong Zheng
,
Qinglan Zhao
,
Chengzhe Lai
,
Fang Ren
A Novel Recommendation Model Based on Trust Relations and Item Ratings in Social Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-23
by
Haokai Song
,
QingQi Pei
,
Yang Xiao
,
Zi Li
,
Yong Wang
Preserving Friendly-Correlations in Uncertain Graphs Using Differential Privacy
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-29
by
Jing Hu
,
Wuchao Shi
,
Hai Liu
,
Jun Yan
,
Yuan Tian
,
Zhenqiang Wu
Physical Layer Authentication and Identification in Wireless Network via the Locations of Surrounding Noise Sources
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-35
by
Yongchao Dang
,
Yin Chen
,
Huihui Wu
,
Yulong Shen
,
Xiaohong Jiang
Efficient ONU Migration for Fixed and Mobile Convergence Network in High-Speed Rail Area
Full-text access may be available. Sign in or learn about subscription options.
pp. 36-41
by
Rentao Gu
,
Shizong Zhang
,
Zidi Yan
,
Yuefeng Ji
Limits of Covert Communication on Two-Hop AWGN Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-47
by
Huihui Wu
,
Xuening Liao
,
Yongchao Dang
,
Yulong Shen
,
Xiaohong Jiang
Secure Transmission with Limited Feedback in MISOME Wiretap Channels
Full-text access may be available. Sign in or learn about subscription options.
pp. 48-53
by
Jiao Quan
,
Xiaochen Li
,
Yeqiu Xiao
,
Yulong Shen
,
Fenghua Li
An Improved Amorphous Algorithm in Wireless Sensor Network Based on Approximate Equilateral Triangle Beacon Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-60
by
Shikai Shen
,
Kaiguo Qian
,
Bin Yang
,
Yumei She
,
Wu Wang
,
Yujian Wang
A Novel Personalized Differential Privacy Mechanism for Trajectory Data Publication
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-68
by
Feng Tian
,
Shuangyue Zhang
,
Laifeng Lu
,
Hai Liu
,
Xiaolin Gui
BF-PDT: A New Name Lookup Mechanism in Content-Centric Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-74
by
Hao Hao
,
Changqiao Xu
,
Shujie Yang
,
Jianfeng Guan
,
Yang Liu
,
Lujie Zhong
A Novel Scheme for Phase Noise Compensation in CO-OFDM Long-Reach Passive Optical Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-79
by
Mohamed Ben Zeglam
,
Pin Han Ho
,
Limei Peng
,
Shuiping Jie
Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 80-86
by
Jia Liu
,
Yang Xu
,
Ruo Ando
,
Hiroki Takakura
,
Yifei Xu
End-to-End Congestion Relief Routing Protocol for Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-92
by
Yang Xu
,
Jia Liu
,
Ruo Ando
,
Norio Shiratori
Secure and Efficient V2V Communications for Heterogeneous Vehicle Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-99
by
Yanping Li
,
Yanjiao Qi
,
Laifeng Lu
Multicast Delivery Delay in General Two-Hop Relay MANETs
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-103
by
Bin Yang
,
Zhenqiang Wu
,
Yulong Shen
,
Yuanyuan Fan
An Empirical Study of Unsolicited Content Injection into a Website
Full-text access may be available. Sign in or learn about subscription options.
pp. 104-111
by
Fu Jianming
,
Xie Mengfei
,
Wang Yingjun
,
Mei Xufen
Hierarchical CSI-fingerprints Classification for Passive Multi-person Localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 112-117
by
Runcong Ma
,
Gwo-Jong Yu
,
Guilin Chen
,
Shenghui Zhao
,
Bin Yang
A Flexible Frame-Oriented Host-FPGA Communication Framework for Software Defined Wireless Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 118-124
by
Jun liu
,
Zhiwei Li
,
Boyan Ding
,
Haoyang Wu
,
Tao Wang
Genomic Privacy Preserving Framework for High-Order SNPs Linkage Disequilibrium on Correlated Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-132
by
Hai Liu
,
Zhenqiang Wu
,
Changgen Peng
,
Xiujuan Lei
Spectral Efficiency, Diversity Gain and Multiplexing Capacity Analysis for Massive MIMO, 5G Communications System
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-137
by
Khem Narayan Poudel
,
Shankar Gangaju
Development of a Hybrid FSO/RF System during Link Misalignment
Full-text access may be available. Sign in or learn about subscription options.
pp. 138-140
by
Kappala Vinod Kiran
,
Shikha Rathore
,
Ashok Kumar Turuk
,
Santos Kumar Das
Application Oriented Sensor Database System
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-146
by
G. S. R. Satyanarayana
,
Debarka Chakraborty
,
Santos Kumar Das
A Privacy Measurement Method Using Network Structure Entropy
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-151
by
Wuchao Shi
,
Jing Hu
,
Jun Yan
,
Zhenqiang Wu
,
Laifeng Lu
Reliability Analysis of Molecular Communication Based on Drift Diffusion
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-157
by
Xinlei Wang
,
Zhenqiang Wu
,
Jiawang Chen
,
Xuanwen Hao
,
Bo Liu
A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence
Full-text access may be available. Sign in or learn about subscription options.
pp. 158-163
by
Shuangyuan Qiao
,
Yong Zeng
,
Lingjie Zhou
,
Zhihong Liu
,
Jianfeng Ma
Delay and Capacity in Three-Dimensional Mobile Ad Hoc Networks with Packet Replication
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-169
by
Wu Wang
,
Bin Yang
,
Shikai Shen
,
Yujian Wang
,
Gang Fang
TSMWD: A High-Speed Malicious Web Page Detection System Based on Two-Step Classifiers
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-175
by
Zhengqi Wang
,
Xiaobing Feng
,
Yukun Niu
,
Chi Zhang
,
Jue Su
An Enhanced Soft Combination Algorithm Based on CUSUM for Cooperative Spectrum Sensing
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-179
by
Jingcheng Miao
,
Xiao Ou Song
LTE Network: Coverage and Capacity Planning — 4G Cellular Network Planning around Banepa
Full-text access may be available. Sign in or learn about subscription options.
pp. 180-185
by
Sujeet Kumar Jha
,
Rupa Rokaya
,
Amit Bhagat
,
Ahmed Raja Khan
,
Laxman Aryal
Wireless Monitoring of Photovoltaics Panels
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-189
by
Rahul Kumar Sah
,
Sushant Ghising
,
Saurab Dulal
,
Manish Karn
,
Suresh Sah
Uncertain Graph Method Based on Triadic Closure Improving Privacy Preserving in Social Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 190-195
by
Jun Yan
,
Lin Zhang
,
Wuchao Shi
,
Jing Hu
,
Zhenqiang Wu
An 802.11 MAC Optimization Mechanism Based on Throughput Proportional Fairness in Multi-rate WLAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 196-202
by
Mu Yan
,
Yatong Wang
,
Su Wu
,
Gang Feng
,
Shuang Qin
MSIPS: Multi-tiered Security IPs Architecture for Secure SoC Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 203-208
by
Zhao Huang
,
Quan Wang
A Security Routing Protocol for Internet of Things Based on RPL
Full-text access may be available. Sign in or learn about subscription options.
pp. 209-213
by
Guojun Ma
,
Xing Li
,
Qingqi Pei
,
Zi Li
A Transmission Mechanism of the Backup for Disaster Recovery in DCNs
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-219
by
Zhan Shi
,
Chenyue Wang
,
Qili Wen
,
Wei Su
,
Huachun Zhou
,
Shuai Gao
Backup Path Provisioning for Service Protection against Disaster Failures in Telecom Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 220-224
by
Xiaowu Du
,
Lisheng Ma
2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster Rescue
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-231
by
Xiang Ji
,
Qingyi Hua
,
Chunyu Li
,
Junsong Tang
,
Anwen Wang
,
Xiaojiang Chen
,
Dingyi Fang
Reputation Propagation for Web Service Composition: A Shapley Value Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 232-238
by
Tao Zhang
,
Yongzhi Wang
,
Guangxia Li
,
Jingjing Guo
,
Qi Li
A CCA-secure Verifiable Mix-Net
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-245
by
Long-Hai Li
,
Cheng-Qiang Huang
,
Shao-Feng Fu
Performance Evaluation and Optimization for Android-Based Web Server
Full-text access may be available. Sign in or learn about subscription options.
pp. 246-251
by
Yajing Zhao
,
Jing Wang
,
Lei Zhang
,
Jingyu Wang
,
Qi Qi
Joint Resource Scheduling for Mobile Multimedia Services in Hierarchical Cloud Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-257
by
Mengjie Liu
,
Yatong Wang
,
Jiang Zhou
,
Gang Feng
,
Shuang Qin
GA-based Load Balancing Algorithm for Distributed Timing Task
Full-text access may be available. Sign in or learn about subscription options.
pp. 258-262
by
Yiming Guo
,
Yulong Wang
,
Lei Zhang
,
Jingyu Wang
,
Qi Qi
The Storage of Virtual Machine Disk Image in Cloud Computing: A Survey
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-267
by
Yuyan Zhao
,
Haibao Chen
,
Shenghui Zhao
,
Yihong Wang
A Novel Approach for Mining Road Information from Low Precision GPS Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 268-273
by
Siqie Zhang
,
Changle Li
,
Xun Zhou
GT-SGD: A Novel Gradient Synchronization Algorithm in Training Distributed Recurrent Neural Network Language Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 274-278
by
Xiaoci Zhang
,
Naijie Gu
,
Robail Yasrab
,
Hong Ye
A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr Signature
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-285
by
You Zhai
,
Guangquan Xu
,
Yao Zhang
Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds
Full-text access may be available. Sign in or learn about subscription options.
pp. 286-291
by
Ning Xi
,
Cong Sun
,
Di Lu
,
Yulong Shen
D2D Communication for Disaster Recovery in Cellular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 292-295
by
Hui Gao
,
Yulong Shen
,
Bin Yang
Big Data Application for Nepalese Government: A Proposed Solution for Labor Migrant
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-302
by
Pratima Pradhan
,
Subarna Shakya
CryptSQLite: Protecting Data Confidentiality of SQLite with Intel SGX
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-308
by
Yongzhi Wang
,
Lingtong Liu
,
Cuicui Su
,
Jiawen Ma
,
Lei Wang
,
Yibo Yang
,
Yulong Shen
,
Guangxia Li
,
Tao Zhang
,
Xuewen Dong
Trust-Aware Data Uploading Based on Device-to-Device Communications
Full-text access may be available. Sign in or learn about subscription options.
pp. 309-313
by
Xiaolan Liu
,
Bin Yang
,
Xiaohong Jiang
Techno-Economic Evaluation of CDN Deployments in Metropolitan Area Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-319
by
Omran Ayoub
,
Francesco Musumeci
,
Massimo Tornatore
,
Achille Pattavina
A Survey of Multipath Transport Mechanism in Software Defined Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 320-325
by
Kai Gao
,
Changqiao Xu
,
Jianfeng Guan
,
Yang Liu
Provoking the Adversary by Dual Detection Techniques: A Game Theoretical Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 326-329
by
Ahmed Salem
,
Xuening Liao
,
Yulong Shen
,
Xiang Lu
Cost Effective Accommodation Planning in a Trip by Using Accommodation Advisor Query (AA-Query) in STPF
Full-text access may be available. Sign in or learn about subscription options.
pp. 330-336
by
Bishnu Prasad Gautam
,
Amit Batajoo
,
Hiroyasu Asami
A Survey on Big Data in Financial Sector
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-340
by
Anku Jaiswal
,
Purrushottam Bagale
A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 341-346
by
Ziyi Han
,
Li Yang
,
Qiang Liu
Research on Power Allocation of Network Coding in Vehicle Networking
Full-text access may be available. Sign in or learn about subscription options.
pp. 347-352
by
Jingjing Hu
,
Yancheng Ji
,
Junma Li
,
Danfeng Dong
Author index
Freely available from IEEE.
pp. 353-355
[Publisher's information]
Freely available from IEEE.
pp. 356-356
Showing 69 out of 69