Ausgabe 4/2021
Inhalt (57 Artikel)
Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems
Chang Xu, Jiachen Wang, Liehuang Zhu, Kashif Sharif, Chuan Zhang, Can Zhang
Tree-searching based trust assessment through communities in vehicular networks
Zhong Li, Xueting Yang, Changjun Jiang
Correction to: A digital rights management system based on a scalable blockchain
Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen
Energy efficient and link reliable routing (E2LR) scheme for underwater sensor networks
Moeenuddin Tariq, Muhammad Ayaz, Fazli Subhan, M. Zahid Abbas
iForest: An informed resource search strategy in mobile P2P networks
Shuai Zhou, Ting Zhang, Xianfu Meng
Reliable scheduling and load balancing for requests in cloud-fog computing
Fayez Alqahtani, Mohammed Amoon, Aida A. Nasr
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks
Efat Yousefpoor, Hamid Barati, Ali Barati
A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications
Kavita Jaiswal, Veena Anand
Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks
Xu Qin, Guanglun Huang, Baoxian Zhang, Cheng Li
P2P mobility management for seamless handover using D2D communication in B5G wireless technology
Shubhanshi Singh, Drishti Kedia, Neha Rastogi, T. Velmurugan, P. Prakasam
A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles
Chengzhe Lai, Yangyang Du, Qili Guo, Dong Zheng
Traffic sign detection and recognition using RGSM and a novel feature extraction method
M. Sudha, Dr.V.P. Galdis pushparathi
Delay - aware bandwidth estimation and intelligent video transcoder in mobile cloud
S.P. Tamizhselvi, Vijayalakshmi Muthuswamy
A self-localization range free protocol for wireless sensor networks
Souhila Silmi, Zouina Doukha, Samira Moussaoui
An energy aware modified PAM clustering with cluster head modulation in Mobile cloud sensor environment
S. Jeen Shene, W. R. Sam Emmanuel
Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing
Chunhai Li, Xiaohuan Li, Yujue Wang, Yong Ding, Feng Zhao
Joint optimization for throughput maximization in underwater acoustic networks with energy harvesting
Zhixin Liu, Xiangyun Meng, Yazhou Yuan, Yi Yang, Kit Yan Chan
Energy and delay-ware massive task scheduling in fog-cloud computing system
Mengying Jia, Jie Zhu, Haiping Huang
Efficient and privacy-preserving range-max query in fog-based agricultural IoT
Min Zhou, Yandong Zheng, Yunguo Guan, Limin Peng, Rongxing Lu
MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud
Xiaopeng Yang, Hui Zhu, Fengwei Wang, Songnian Zhang, Rongxing Lu, Hui Li
A critical analysis of RPL objective functions in internet of things paradigm
Neeti Gupta, Anuradha Pughat, Vidushi Sharma
Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system
Ramaprabha Jayaram, S. Prabakaran
Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks
Lunzhi Deng, Jianxin Shao, Zhenyu Hu
Joint offloading and energy optimization for wireless powered mobile edge computing under nonlinear EH Model
Hua Shi, Ronghua Luo, Guan Gui
One radish, One hole: Specific adversarial training for enhancing neural network’s robustness
Yun Zhang, Hongwei Li, Guowen Xu, Shuai Yuan, Xiaoming Huang
RETRACTED ARTICLE: SPAHN novel approach for PL-AG gateway discovery for internet connectivity
K. Kannan, P. Sivaranjani, S. Sathish Kumar, M. Nalini, V. R. Balaji, P. Sanjeevi
MDRP: Message dissemination with re-route planning method for emergency vehicle information exchange
R. P. Meenaakshi Sundhari, L. Murali, S. Baskar, P. Mohamed Shakeel
Scalable aggregation plan (SAP) for portable network in a box (NIB) architecture
Torki Altameem, Ayman Altameem
CAN bus network design of bifurcated power electric tractor
Liu Mengnan, Han Bing, Xu Liyou, Li Yanying
Transmission adaptive mode selection (TAMS) method for internet of things device energy management
Mohammed Al-Ma’aitah, Ayed Alwadain, Aldosary Saad
Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection
K. Nirmal, B. Janet, R. Kumar
SRAF: Scalable Resource Allocation Framework using Machine Learning in user-Centric Internet of Things
Zafer Al-Makhadmeh, Amr Tolba
A novel predicate based access control scheme for cloud environment using open stack swift storage
Chunduru Anilkumar, Sumathy Subramanian
A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
Deevi Radha Rani, G. Geethakumari
Privacy preserving E-voting cloud system based on ID based encryption
Achyut Shankar, P. Pandiaraja, K. Sumathi, Thompson Stephan, Pavika Sharma
High utility itemset mining using path encoding and constrained subset generation
Vamsinath Javangula, Suvarna Vani Koneru, Haritha Dasari
FAST: Fast Accessing Scheme for data Transmission in cloud computing
Suyel Namasudra, Rupak Chakraborty, Seifedine Kadry, Gunasekaran Manogaran, Bharat S. Rawal
An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment
Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, Mary Saira Bhanu S
PriPresent: an embedded prime LightWeight block cipher for smart devices
M. Girija, P. Manickam, M. Ramaswami
An optimistic technique to detect Cache based Side Channel attacks in Cloud
G. Sangeetha, G. Sumathi
Intelligent physical systems for strategic planning and management of enterprise information
Changyou Ye, Xiaowei Song, G. N. Vivekananda, V. Savitha
Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs)
D. N. S. Ravi Kumar, S. Barani
A trust infrastructure based authentication method for clustered vehicular ad hoc networks
Fatemehsadat Mirsadeghi, Marjan Kuchaki Rafsanjani, Brij B. Gupta
Analysis of intrusion detection in cyber attacks using DEEP learning neural networks
Parasuraman Kumar, A. Anbarasa Kumar, C. Sahayakingsly, A. Udayakumar