Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             51 results found
no title author magazine year volume issue page(s) type
1 A hybrid approach towards reduced checkpointing overhead in cloud-based applications Sinha, Bharati

15 1 p. 473-483
article
2 Analytical modelling of false blocking problem in wireless ad hoc networks Chong, Wai Kheong

15 1 p. 221-245
article
3 An autonomous intrusion detection system for the RPL protocol Shirafkan, Mohammad

15 1 p. 484-502
article
4 An efficient and privacy-preserving mutual authentication with key agreement scheme for telecare medicine information system Chen, Yulei

15 1 p. 516-528
article
5 A new fog-based routing strategy (FBRS) for vehicular ad-hoc networks El Gayyar, Khaled S.

15 1 p. 386-407
article
6 An improved k-angle coverage algorithm for multimedia wireless sensor networks based on two-layer tabu search Wu, Huarui

15 1 p. 28-44
article
7 An improved secure certificateless public-key searchable encryption scheme with multi-trapdoor privacy Yang, Guang

15 1 p. 503-515
article
8 An intelligent traffic prediction framework for 5G network using SDN and fusion learning Selvi, K. Tamil

15 1 p. 751-767
article
9 An OLSR-based Geocast Routing Protocol for Vehicular Ad Hoc Networks Kachooei, Maryam Ataei

15 1 p. 246-266
article
10 An optimal load balancing strategy for P2P network using chicken swarm optimization Kumar, Dharmendra

15 1 p. 666-688
article
11 A novel hierarchical fault management framework for wireless sensor networks: HFMF Moridi, Elham

15 1 p. 45-55
article
12 An uneven annulus sector grid-based energy-efficient multi-hop routing protocol for wireless sensor networks Huang, Jianhua

15 1 p. 559-575
article
13 Application-aware QoS routing in SDNs using machine learning techniques Zheng, Weichang

15 1 p. 529-548
article
14 AToM: Active topology monitoring for the bitcoin peer-to-peer network Franzoni, Federico

15 1 p. 408-425
article
15 A trust based energy and mobility aware routing protocol to improve infotainment services in VANETs Shafi, Shaik

15 1 p. 576-591
article
16 A two-phase fuzzy based access network selection scheme for vehicular ad hoc networks Evangeline, C. Suganthi

15 1 p. 107-133
article
17 BCPPT: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property Zhuang, Chuxin

15 1 p. 724-738
article
18 Big data analytics for critical information classification in online social networks using classifier chains Silva, Douglas H.

15 1 p. 626-641
article
19 Cloudlet deployment for workflow applications in a mobile edge computing-wireless metropolitan area network Zhao, Xu

15 1 p. 739-750
article
20 Clover: An anonymous transaction relay protocol for the bitcoin P2P network Franzoni, Federico

15 1 p. 290-303
article
21 Clustered NOMA-based downlink adaptive relay coordinated transmission scheme for future 6G cell-free edge network Peng, Xuefei

15 1 p. 612-625
article
22 Continuous improvement of script-driven verifiable random functions for reducing computing power in blockchain consensus protocols Guo, Guanglai

15 1 p. 304-323
article
23 Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection Thakur, Vidyotma

15 1 p. 206-220
article
24 Decentralized access control technique with multi-tier authentication of user for cloud storage Shiny, S.

15 1 p. 13-27
article
25 Deep action: A mobile action recognition framework using edge offloading Zhang, Deyu

15 1 p. 324-339
article
26 Determination of energy efficient optimal sojourn location of mobile sinks in clustered corona-based wireless sensor networks K, Mohaideen Pitchai

15 1 p. 1-12
article
27 Developing a novel methodology for virtual machine introspection to classify unknown malware functions Vaza, Rahul N.

15 1 p. 793-810
article
28 Distributed Address Table (DAT): A Decentralized Model for End-to-End Communication in IoT Alshawki, Mohammed B.

15 1 p. 178-193
article
29 Double agents-DQL based D2D computing-offloading for SHVC Liu, Jianlong

15 1 p. 56-76
article
30 Efficient path-sense transmission based on IoT system in opportunistic social networks Li, Xiaoli

15 1 p. 811-826
article
31 Efficient topology control of blockchain peer to peer network based on SDN paradigm Deshpande, Varun

15 1 p. 267-289
article
32 EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things Bang, A. O.

15 1 p. 642-665
article
33 Enabling rank-based distribution of microservices among containers for green cloud computing environment Saboor, Abdul

15 1 p. 77-91
article
34 Energy aware MAC protocol with mobility management in wireless body area network Dhanvijay, Mrinai Maneetkumar

15 1 p. 426-443
article
35 Fuzzy routing for in-network aggregation in wireless sensor networks Maivizhi, Radhakrishnan

15 1 p. 592-611
article
36 Joint computation offloading and deployment optimization in multi-UAV-enabled MEC systems Chen, Zheyi

15 1 p. 194-205
article
37 Joint pricing and task allocation for blockchain empowered crowd spectrum sensing Chen, Wenbin

15 1 p. 783-792
article
38 Joint resource allocation for QoE optimization in large-scale NOMA-enabled multi-cell networks Jia, Jie

15 1 p. 689-702
article
39 LocTrust: A local and global consensus-combined trust model in MANETs Zhou, Shuai

15 1 p. 355-368
article
40 Machine-learning-based cache partition method in cloud environment Qiu, Jiefan

15 1 p. 149-162
article
41 MINAD: Multi-inputs Neural Network based on Application Structure for Android Malware Detection Nguyen, Duc V.

15 1 p. 163-177
article
42 MPLDS: An integration of CP-ABE and local differential privacy for achieving multiple privacy levels data sharing Song, Haina

15 1 p. 369-385
article
43 Obfuscation-based location privacy-preserving scheme in cloud-enabled internet of vehicles Benarous, Leila

15 1 p. 461-472
article
44 Optimal hybrid heat transfer search and grey wolf optimization-based homomorphic encryption model to assure security in cloud-based IoT environment Jeniffer, J. Thresa

15 1 p. 703-723
article
45 Privacy-preserving comparison based data aggregation protocols for mobile sensing Liu, Weinan

15 1 p. 549-558
article
46 Reducing the number of transaction messages in bitcoin Mišić, Vojislav B.

15 1 p. 768-782
article
47 Robustness against fraudulent activities of a blockchain-based online review system Karode, Tanakorn

15 1 p. 92-106
article
48 SCMP-V: A secure multiple relays cooperative downloading scheme with privacy preservation in VANETs Liu, Xuejiao

15 1 p. 340-354
article
49 The reliable routing for software-defined vehicular networks towards beyond 5G Lu, Yaoguang

15 1 p. 134-148
article
50 Towards intelligent P2P IPTV overlay management through classification of peers Ali, Muhammad

15 1 p. 827-838
article
51 Trusted resource allocation based on proof-of-reputation consensus mechanism for edge computing Hu, Qiaohong

15 1 p. 444-460
article
                             51 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands