Research Trends and Challenges for Network-Based ICT Systems

Welcome to this special issue of Wireless Personal Communications on Research Trends and Challenges for Network-based ICT Systems. This special issue provide an in-depth research study of the latest trends and challenges for network-based ICT systems. The convergence of information and communication technologies (ICT), have resulted into significant changes for our network infrastructures. We have witnessed an evolution from a small number of interconnected computer networks to a global socio-technical infrastructure, where people communicate and interact spontaneously in cyberspace and

[1]  Sergej Jakovlev,et al.  Cooperative Context Data Acquisition and Dissemination for Situation Identification in Vehicular Communication Networks , 2015, Wirel. Pers. Commun..

[2]  Ramjee Prasad,et al.  On Modeling the Psychology of Wireless Node Interactions in the Context of Internet of Things , 2015, Wirel. Pers. Commun..

[3]  Rajappa Muthaiah,et al.  A Dynamic-Identity Based Multimedia Server Client Authentication Scheme for Tele-Care Multimedia Medical Information System , 2015, Wirel. Pers. Commun..

[4]  Wei Liang,et al.  A New Dynamic ID-Based User Authentication Scheme Using Mobile Device: Cryptanalysis, the Principles and Design , 2015, Wirel. Pers. Commun..

[5]  Ivan Baronak,et al.  Model to Increase the Number of Output States of a Random Variable Using a Histogram Based PDF , 2015, Wirel. Pers. Commun..

[6]  Ray-Guang Cheng,et al.  Analysis of Slotted-Access-Based Channel Access Control Protocol for LTE-Advanced Networks , 2015, Wirel. Pers. Commun..

[7]  Rafael Martínez-Peláez,et al.  P2PM-pay: Person to Person Mobile Payment Scheme Controlled by Expiration Date , 2015, Wirel. Pers. Commun..

[8]  P. Karthigaikumar,et al.  PSP CO2: An Efficient Hardware Architecture for AES Algorithm for High Throughput , 2015, Wirel. Pers. Commun..

[9]  Fahad Bin Muhaya,et al.  An Efficient Remote User Authentication with Key Agreement Scheme Using Elliptic Curve Cryptography , 2015, Wirel. Pers. Commun..

[10]  F. Richard Yu,et al.  Navigation Data-Assisted Opportunistic Spectrum Scheduling for Network-Based UAV Systems: A Parallel Restless Bandits Formulation , 2015, Wirel. Pers. Commun..

[11]  Miroslav Voznák,et al.  Centralized IDS Based on Misuse Detection for Cluster-Based Wireless Sensors Networks , 2015, Wireless Personal Communications.

[12]  Miroslav Voznák,et al.  Voice Messaging System as a Form of Distribution of an Urgent Information , 2015, Wirel. Pers. Commun..

[13]  Azeddine Bilami,et al.  A Cross-Layer Communication Protocol with Transmission Power Adjustment for Energy Saving in Multi-hop MhWSNs , 2015, Wirel. Pers. Commun..

[14]  Al-Sakib Khan Pathan,et al.  Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body , 2015, Wirel. Pers. Commun..

[15]  Aarti Jain,et al.  Ant Colony Optimization Based Orthogonal Directional Proactive–Reactive Routing Protocol for Wireless Sensor Networks , 2015, Wirel. Pers. Commun..