Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             49 results found
no title author magazine year volume issue page(s) type
1 A blockchain-based coin mixing protocol with certificateless signcryption Banaeian Far, Saeed

16 2 p. 1106-1124
article
2 A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme Vidhya, S.

16 2 p. 900-913
article
3 A blockchain-based traceability system with efficient search and query Lai, Chengzhe

16 2 p. 675-689
article
4 A blockchain shard storage model suitable for multi-view Zhuang, Chuxin

16 2 p. 538-553
article
5 A3C-based load-balancing solution for computation offloading in SDN-enabled vehicular edge computing networks Lu, Lingyu

16 2 p. 1242-1256
article
6 Adaptive application offloading for QoS maximization in cloud-fog environment with delay-constraint Chauhan, Naveen

16 2 p. 1010-1026
article
7 A domain name management system based on account-based consortium blockchain Lu, Genhua

16 2 p. 1211-1226
article
8 A dynamic resource management algorithm for maximizing service capability in fog-empowered vehicular ad-hoc networks Thanedar, Md Asif

16 2 p. 932-946
article
9 A fuzzy based hierarchical flash crowd controller for live video streaming in P2P network Ansari, Md. Sarfaraj Alam

16 2 p. 1027-1048
article
10 A GNN-based proactive caching strategy in NDN networks Hou, Jiacheng

16 2 p. 997-1009
article
11 A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks Vazhuthi, P. Paruthi Ilam

16 2 p. 1049-1068
article
12 An Edge-Fog-Cloud computing architecture for IoT and smart metering data Oprea, Simona-Vasilica

16 2 p. 818-845
article
13 An efficient DDoS attack detection and categorization using adolescent identity search-based weighted SVM model Barona, R.

16 2 p. 1227-1241
article
14 An efficient task offloading and resource allocation using dynamic arithmetic optimized double deep Q-network in cloud edge platform Kumaran, K.

16 2 p. 958-979
article
15 An identity-based traceable ring signatures based on lattice Liang, Junbin

16 2 p. 1270-1285
article
16 An improved Kalman filter using ANN-based learning module to predict transaction throughput of blockchain network in clinical trials Hang, Lei

16 2 p. 520-537
article
17 An intelligent blockchain strategy for decentralised healthcare framework Goel, Akanksha

16 2 p. 846-857
article
18 A smart collaborative framework for dynamic multi-task offloading in IIoT-MEC networks Ai, Zhengyang

16 2 p. 749-764
article
19 Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks Tu, Zhe

16 2 p. 727-748
article
20 Blockchain-enabled solution for secure and scalable V2V video content dissemination Shen, Hang

16 2 p. 554-570
article
21 Combining information centric and software defined networking to support command and control agility in military mobile networks Matiuzzi Stocchero, Jorgito

16 2 p. 765-784
article
22 Community trend message locking routing protocol for delay tolerant network Ayub, Qaisar

16 2 p. 1155-1173
article
23 Computationally efficient peer-to-peer energy trading mechanisms for autonomous agents considering network constraints and privacy preservation Sadati, Seyed Ali

16 2 p. 1088-1105
article
24 C3P-RPL: A collaborative and proactive approach for optimal peer to peer path selection and sustenance Anusha, T.

16 2 p. 914-931
article
25 Cross-domain heterogeneous signcryption with keyword search for wireless body area network Luo, Ming

16 2 p. 644-656
article
26 CSSA-based collaborative optimization recommendation of users in mobile crowdsensing Wang, Jian

16 2 p. 803-817
article
27 DCCWOA: A multi-heuristic fault tolerant scheduling technique for cloud computing environment Liakath, Javid Ali

16 2 p. 785-802
article
28 Dynamic shielding to secure multi-hop communications in vehicular platoons Yang, Yiran

16 2 p. 488-498
article
29 Efficient time-delay attack detection based on node pruning and model fusion in IoT networks Zhao, Wenjie

16 2 p. 1286-1309
article
30 Enhancing the performance of permissionless blockchain networks through randomized message-based consensus algorithm Ayenew, Melak

16 2 p. 499-519
article
31 ESA-FedGNN: Efficient secure aggregation for federated graph neural networks Liu, Yanjun

16 2 p. 1257-1269
article
32 FabricETP: A high-throughput blockchain optimization solution for resolving concurrent conflicting transactions Wu, Haibo

16 2 p. 858-875
article
33 Fault tolerance designs of interconnection networks Nadeem, Muhammad Faisal

16 2 p. 1125-1134
article
34 Fog-based low latency and lightweight authentication protocol for vehicular communication Akram, Muhammad Arslan

16 2 p. 629-643
article
35 Hierarchical traffic light-aware routing via fuzzy reinforcement learning in software-defined vehicular networks Naderi, Mohammad

16 2 p. 1174-1198
article
36 Hybrid scheduling strategy of multiple mobile charging vehicles in wireless rechargeable sensor networks Zhao, Chuanxin

16 2 p. 980-996
article
37 LBABC: Distributed controller load balancing using artificial bee colony optimization in an SDN Sridevi, K.

16 2 p. 947-957
article
38 LRBFT: Improvement of practical Byzantine fault tolerance consensus protocol for blockchains based on Lagrange interpolation Wang, Zhen-Fei

16 2 p. 690-708
article
39 Mobility-Enabled Sustainable Data Collection in Wireless Sensor Networks Ranjan, Rajeev

16 2 p. 1199-1210
article
40 Modeling & analysis of block generation process of the mining pool in blockchain system Zhang, Changzhen

16 2 p. 475-487
article
41 Novel data transmission technology based on complex IoT system in opportunistic social networks Gou, Fangfang

16 2 p. 571-588
article
42 Offloading dependent tasks in MEC-enabled IoT systems: A preference-based hybrid optimization method Sadatdiynov, Kuanishbay

16 2 p. 657-674
article
43 OlaRout: Optimal dropbox deployment based cluster routing for post disaster information exchange in a smart city Das, Nabanita

16 2 p. 876-899
article
44 Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet Arulprakash, P.

16 2 p. 1310-1326
article
45 Optimal RSU deployment using complex network analysis for traffic prediction in VANET Ghosh, Sreya

16 2 p. 1135-1154
article
46 Piece-wise pricing optimization with computation resource constraints for parked vehicle edge computing Lin, Chunxin

16 2 p. 709-726
article
47 Social-aware D2MD user grouping based on game theory and deep Q-learning Liu, Jianlong

16 2 p. 606-628
article
48 Time window-based online task assignment in mobile crowdsensing: Problems and algorithms Peng, Shuo

16 2 p. 1069-1087
article
49 6WPSN: Reliable and efficient IPv6 packet broadcast protocol for IEEE 802.15.4-based wireless powered sensor networks Qiu, Shuwei

16 2 p. 589-605
article
                             49 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands