Chapter 1. Performance Evaluation of G.711 and GSM Codecs on VoIP Applications using OSPF and RIP Routing Protocols.- Chapter 2. Cyclic Redundancy Check based Data Authentication in Opportunistic Networks.- Chapter 3. Hybrid Cryptographic Based Approach for Privacy Preservation in Location Based Services.- Chapter 4. Design of Energy-Aware PRoPHET and Spray-and-Wait Routing Protocols for Opportunistic Networks.- Chapter 5.An Asymmetric RSA based Security Approach for Opportunistic IoT.- Chapter 6. Performance Analysis of A* Based Hop Selection Technique in Opportunistic Networks through Movement Mobility Models.- Chapter 7. Data Loss Prevention Using Document Semantic Signature.- Chapter 8. Data Loss Prevention Using Document Semantic Signature.- Chapter 9. PSARV: Particle Swarm Angular Routing in Vehicular Ad hoc Networks.- Chapter 10. A Reliable Firefly-based Routing Protocol for Efficient Communication in Vehicular Ad Hoc Networks.- Chapter 11. Exploring the Application of Random Sampling in Spectrum Sensing.- Chapter 12. White-box Cryptography: A Time-security Trade-off for the SPNbox Family.- Chapter 13. CESIS: Cost Effective and Self-regulating Irrigation System.- Chapter 14. Maximum Eigenvalue based detection using Jittered Random Sampling.- Chapter 15. Prevention of Flooding Attacks in Mobile Ad hoc Networks.- Chapter 16. Prevention of Flooding Attacks in Mobile Ad hoc Networks.- Chapter 17. Real Time Spectrum Occupancy Prediction.- Chapter 18. SCC-LBS: Secure Criss-Cross Location Based Service in Logistics.

Share This Book: