Default Cover Image

2017 International Conference on Networking and Network Applications (NaNA)

Oct. 16 2017 to Oct. 19 2017

Kathmandu City, Nepal

Table of Contents

[Title page I]Freely available from IEEE.pp. i-i
[Title page iii]Freely available from IEEE.pp. iii-iii
[Copyright notice]Freely available from IEEE.pp. iv-iv
Table of contentsFreely available from IEEE.pp. v-x
Message from General Conference ChairsFreely available from IEEE.pp. xi-xi
Conference OrganizationFreely available from IEEE.pp. xii-xiii
KeynotesFull-text access may be available. Sign in or learn about subscription options.pp. xiv-xvi
Efficient (k, n) Secret Sharing Scheme Secure against k — 2 CheatersFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 5-10
A Novel Recommendation Model Based on Trust Relations and Item Ratings in Social NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 17-23
Preserving Friendly-Correlations in Uncertain Graphs Using Differential PrivacyFull-text access may be available. Sign in or learn about subscription options.pp. 24-29
Efficient ONU Migration for Fixed and Mobile Convergence Network in High-Speed Rail AreaFull-text access may be available. Sign in or learn about subscription options.pp. 36-41
Limits of Covert Communication on Two-Hop AWGN ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 42-47
Secure Transmission with Limited Feedback in MISOME Wiretap ChannelsFull-text access may be available. Sign in or learn about subscription options.pp. 48-53
A Novel Personalized Differential Privacy Mechanism for Trajectory Data PublicationFull-text access may be available. Sign in or learn about subscription options.pp. 61-68
BF-PDT: A New Name Lookup Mechanism in Content-Centric NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 69-74
A Novel Scheme for Phase Noise Compensation in CO-OFDM Long-Reach Passive Optical NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 75-79
Resource Allocation for Throughput Optimization in Buffer-Limited Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 80-86
End-to-End Congestion Relief Routing Protocol for Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 87-92
Secure and Efficient V2V Communications for Heterogeneous Vehicle Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 93-99
Multicast Delivery Delay in General Two-Hop Relay MANETsFull-text access may be available. Sign in or learn about subscription options.pp. 100-103
An Empirical Study of Unsolicited Content Injection into a WebsiteFull-text access may be available. Sign in or learn about subscription options.pp. 104-111
Hierarchical CSI-fingerprints Classification for Passive Multi-person LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 112-117
A Flexible Frame-Oriented Host-FPGA Communication Framework for Software Defined Wireless NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 118-124
Genomic Privacy Preserving Framework for High-Order SNPs Linkage Disequilibrium on Correlated SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 125-132
Development of a Hybrid FSO/RF System during Link MisalignmentFull-text access may be available. Sign in or learn about subscription options.pp. 138-140
Application Oriented Sensor Database SystemFull-text access may be available. Sign in or learn about subscription options.pp. 141-146
A Privacy Measurement Method Using Network Structure EntropyFull-text access may be available. Sign in or learn about subscription options.pp. 147-151
Reliability Analysis of Molecular Communication Based on Drift DiffusionFull-text access may be available. Sign in or learn about subscription options.pp. 152-157
A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon DivergenceFull-text access may be available. Sign in or learn about subscription options.pp. 158-163
Delay and Capacity in Three-Dimensional Mobile Ad Hoc Networks with Packet ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 164-169
TSMWD: A High-Speed Malicious Web Page Detection System Based on Two-Step ClassifiersFull-text access may be available. Sign in or learn about subscription options.pp. 170-175
An Enhanced Soft Combination Algorithm Based on CUSUM for Cooperative Spectrum SensingFull-text access may be available. Sign in or learn about subscription options.pp. 176-179
Wireless Monitoring of Photovoltaics PanelsFull-text access may be available. Sign in or learn about subscription options.pp. 186-189
Uncertain Graph Method Based on Triadic Closure Improving Privacy Preserving in Social NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 190-195
An 802.11 MAC Optimization Mechanism Based on Throughput Proportional Fairness in Multi-rate WLANFull-text access may be available. Sign in or learn about subscription options.pp. 196-202
MSIPS: Multi-tiered Security IPs Architecture for Secure SoC DesignFull-text access may be available. Sign in or learn about subscription options.pp. 203-208
A Security Routing Protocol for Internet of Things Based on RPLFull-text access may be available. Sign in or learn about subscription options.pp. 209-213
A Transmission Mechanism of the Backup for Disaster Recovery in DCNsFull-text access may be available. Sign in or learn about subscription options.pp. 214-219
Backup Path Provisioning for Service Protection against Disaster Failures in Telecom NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 220-224
2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster RescueFull-text access may be available. Sign in or learn about subscription options.pp. 225-231
Reputation Propagation for Web Service Composition: A Shapley Value ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 232-238
A CCA-secure Verifiable Mix-NetFull-text access may be available. Sign in or learn about subscription options.pp. 239-245
Performance Evaluation and Optimization for Android-Based Web ServerFull-text access may be available. Sign in or learn about subscription options.pp. 246-251
Joint Resource Scheduling for Mobile Multimedia Services in Hierarchical Cloud NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 252-257
GA-based Load Balancing Algorithm for Distributed Timing TaskFull-text access may be available. Sign in or learn about subscription options.pp. 258-262
The Storage of Virtual Machine Disk Image in Cloud Computing: A SurveyFull-text access may be available. Sign in or learn about subscription options.pp. 263-267
A Novel Approach for Mining Road Information from Low Precision GPS DataFull-text access may be available. Sign in or learn about subscription options.pp. 268-273
A Low-Storage-TTP and Abuse-Free Contract Signing Protocol Based on the Schnorr SignatureFull-text access may be available. Sign in or learn about subscription options.pp. 279-285
Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 286-291
D2D Communication for Disaster Recovery in Cellular NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 292-295
Big Data Application for Nepalese Government: A Proposed Solution for Labor MigrantFull-text access may be available. Sign in or learn about subscription options.pp. 296-302
Trust-Aware Data Uploading Based on Device-to-Device CommunicationsFull-text access may be available. Sign in or learn about subscription options.pp. 309-313
Techno-Economic Evaluation of CDN Deployments in Metropolitan Area NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 314-319
A Survey of Multipath Transport Mechanism in Software Defined NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 320-325
Provoking the Adversary by Dual Detection Techniques: A Game Theoretical FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 326-329
A Survey on Big Data in Financial SectorFull-text access may be available. Sign in or learn about subscription options.pp. 337-340
A Novel Multifactor Two-Server Authentication Scheme under the Mobile Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 341-346
Research on Power Allocation of Network Coding in Vehicle NetworkingFull-text access may be available. Sign in or learn about subscription options.pp. 347-352
Author indexFreely available from IEEE.pp. 353-355
[Publisher's information]Freely available from IEEE.pp. 356-356
Showing 69 out of 69