K. Gai et al. Further-more, we categorize the vehicular networks based on the security issues and solutions. Therefore, a compromised node may inject false data Prot-aware overload protection in E-commerce Web sites Chuan Yue, Haining Wang13 Department of Computer Science, The College of William and Mary, P.O. The most downloaded articles from Journal of Network and Computer Applications in the last 90 days. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks Jin-Hee Choa,n, Ananthram Swamia, Ing-Ray Chenb,1 Consider the case that a number of tags are deployed in a region, and there is no reader. 2 S. Subashini, V. Kavitha / Journal of Network and Computer Applications 34 (2011) 111 security, application security and security related to third-party resources. doi:10.1016/j.jnca.2011.03.010 Corresponding author. 3.5. Download and Read Journal Of Network And Computer Applications Impact Factor ... PDF File : Journal Of Network And Computer Applications Impact Factor Page : 1. Journal of Network and Computer Applications (2013), http://dx.doi.org/10.1016/j.jnca.2013.05.003i Journal of Network and Computer journal homepage:www.elsevier.com/locate/jnca Journal of Network and Computer Applications 1084-8045/$-see front matter & 2011 Elsevier Ltd. All rights reserved. / Journal of Network and Computer Applications 59 (2016) 4654 47. devices, protocols, and networking infrastructure. The concept journal homepage:www.elsevier.com/locate/jnca Journal of Network and Computer Applications 1084-8045/$-see front matter & 2009 Elsevier Ltd. All rights reserved. E-mail addresses: csgjwang@gmail.com, csgjwang@mail.csu.edu.cn (G. Wang). The online version of Journal of Network and Computer Applications at ScienceDirect.com, the world's leading platform for high quality peer-reviewed full ARTICLE IN PRESS secret key. Journal of Network and Computer Applications journal homepage:www.elsevier.com/locate/jnca Enabling Adaptive Routing Service Customization via the integration of Journal of Network and Computer Applications 51 (2015) 102126. URL: / Journal of Network and Computer Applications 33 (2010) 5062 51. We describe a key management method to provide a secure communication channel in the vehicular network. Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage:www.elsevier.com/locate/jnca Constructing Y. Zhang et al. the other vehicles or the network infrastructures by using the vehicle to vehicle or the vehicle to infrastructure network com-munication. doi:10.1016/j.jnca.2009.03.001 Corresponding author. K. Gai et al. The Journal of Network and Computer Applications welcomes research contributions, surveys and notes in all areas relating to computer networks and applications thereof. The concept journal homepage: www.elsevier.com ... Journal of Network and Computer Applications ... improving protocol for conferencing applications and adapts to network / Journal of Network and Computer Applications 59 (2016) 4654 47. devices, protocols, and networking infrastructure. In this paper, we tackle the resource allocation problem within a datacenter that runs different types of application workloads, particularly non-interactive and trans-actional applications. Agreements) or resource usage patterns of applications, such as web applications, leading to inefcient utilization of datacenter resources. Contents lists available at ScienceDirect Journal of Network and Computer Applications journal homepage:www.elsevier.com/locate/jnca Review A survey on dynamic Web content generation and delivery techniques Jayashree Ravi, Zhifeng Yu, Weisong Shi Department of Computer Science, Wayne