Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             17 results found
no title author magazine year volume issue page(s) type
1 A high performance two-layer consensus architecture for blockchain-based IoT systems Qushtom, Haytham

15 5 p. 2444-2456
article
2 A lightweight pairing-free ciphertext-policy attribute-based signcryption for cloud-assisted IoT Kiran, Medikonda Asha

15 5 p. 2390-2403
article
3 A Mixed-integer programming model using particle swarm optimization algorithm for resource discovery in the cloudiot Goudarzi, Parisa

15 5 p. 2326-2346
article
4 An enhanced mutually authenticated security protocol with key establishment for cloud enabled smart vehicle to grid network Sureshkumar, Venkatasamy

15 5 p. 2347-2363
article
5 A new design of intrusion detection in IoT sector using optimal feature selection and high ranking-based ensemble learning model Gopalakrishnan, B.

15 5 p. 2199-2226
article
6 A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs) Jethava, Gordhan

15 5 p. 2253-2269
article
7 Blockchain-based multi-user certificateless encryption with keyword search for electronic health record sharing Yang, Xiaodong

15 5 p. 2270-2288
article
8 Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network Thirunavukkarasu, V.

15 5 p. 2240-2252
article
9 DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics Fan, Junchao

15 5 p. 2376-2389
article
10 Energy efficient clustering with compressive sensing for underwater wireless sensor networks Bhaskarwar, Roshani V.

15 5 p. 2289-2306
article
11 EPSAPI: An efficient and provably secure authentication protocol for an IoT application environment Algubili, Bahaa Hussein Taher

15 5 p. 2179-2198
article
12 Fog-assisted hierarchical data routing strategy for IoT-enabled WSN: Forest fire detection Moussa, Noureddine

15 5 p. 2307-2325
article
13 Managing communities in decentralised social environments Guidi, Barbara

15 5 p. 2404-2429
article
14 Privacy-preserving “Check-in Award” Service in Location-based Social Networks Hou, Hua

15 5 p. 2364-2375
article
15 Revisiting FAW attack in an imperfect PoW blockchain system Zhu, Haoran

15 5 p. 2430-2443
article
16 Scale-free networks: evolutionary acceleration of the network survivability and its quantification Yu, Anqi

15 5 p. 2227-2239
article
17 Service function path selection methods for multi-layer satellite networks Li, Taixin

15 5 p. 2161-2178
article
                             17 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands