-
End-to-end MQTT security protocol using elliptic curve cryptography algorithm
| Vol. 19 No.5 | pp.1-8|Year 2019 Month 10
-
A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment
| Vol. 19 No.5 | pp.9-17|Year 2019 Month 10
-
Integrated Management System for Vehicle CCTV Video Using Reverse Tunneling
| Vol. 19 No.5 | pp.19-24|Year 2019 Month 10
-
A study on ICO-based fund investment
| Vol. 19 No.5 | pp.25-32|Year 2019 Month 10
-
A GDPR based Approach to Enhancing Blockchain Privacy
| Vol. 19 No.5 | pp.33-38|Year 2019 Month 10
-
Performance of Overlay Cognitive Radio NOMA Systems with Selected Relay for Non-licensed Receiver
| Vol. 19 No.5 | pp.39-45|Year 2019 Month 10
-
Blind Adaptive Receiver based on Constant Modulus for Downlink MC-CDMA Systems
| Vol. 19 No.5 | pp.47-54|Year 2019 Month 10
-
Joint Transceiver Design for SWIPT in MIMO Interference Channel
| Vol. 19 No.5 | pp.55-62|Year 2019 Month 10
-
A Study on MQTT based on Priority Topic for IIoT
| Vol. 19 No.5 | pp.63-71|Year 2019 Month 10
-
Distributed Algorithm for Maximal Weighted Independent Set Problem in Wireless Network
| Vol. 19 No.5 | pp.73-78|Year 2019 Month 10