Enhancing Capacity and Network Performance of Client-Server Architectures Using Mobile IPv6 Host-Based Network Protocol
Trust-Based Security Technique to Curb Cooperative Black Hole Attacks in Mobile Ad Hoc Networks using OTB-DSR Protocol in NS-3
Introducing Connected Dominating Set as Selection Feature of Cluster Heads in Hierarchical Protocols of Wireless Sensor Networks
Modeling on Body Delay Tolerant Network Sink Locality of Wireless Body Area Networks for Different Body Postures