Resource allocation in two-tier small-cell networks with energy consumption constraints Libo JiaoHao YinQin Gao OriginalPaper 07 January 2019 Pages: 1 - 15
Emergency-level-based healthcare information offloading over fog network Cong ZhangHsin-Hung ChoChi-Yuan Chen OriginalPaper 04 January 2019 Pages: 16 - 26
RELOAD/CoAP architecture for the federation of wireless sensor networks L. RodriguesJ. GuerreiroN. Correia OriginalPaper 08 January 2019 Pages: 27 - 37
FDFA: A fog computing assisted distributed analytics and detecting system for family activities Fei GuJianwei NiuShui Yu OriginalPaper 14 January 2019 Pages: 38 - 52
A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks Wang HongLi JianhuaWang Zhe OriginalPaper 16 January 2019 Pages: 53 - 63
A software defined caching framework based on user access behavior analysis for transparent computing server Weimin LiBin WangJiaguang Liu OriginalPaper 07 December 2018 Pages: 64 - 81
Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET R. MadhusudhanShashidhara R. OriginalPaper 31 January 2019 Pages: 82 - 103
Task offloading in mobile fog computing by classification and regression tree Dadmehr RahbariMohsen Nickray OriginalPaper 01 February 2019 Pages: 104 - 122
Efficient combination policies for diffusion adaptive networks Jie WangFei DaiGuan Gui OriginalPaper 11 February 2019 Pages: 123 - 136
P2P matchmaking solution for online games Michał BorońJerzy BrzezińskiAnna Kobusińska OriginalPaper Open access 16 February 2019 Pages: 137 - 150
Performance Modeling of Linux Network System with Open vSwitch Runkai YangXiaolin ChangVojislav B. Mišić OriginalPaper 21 February 2019 Pages: 151 - 162
Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN Ata UllahGhawar SaidHuansheng Ning OriginalPaper 28 March 2019 Pages: 163 - 174
TrueTrust: a feedback-based trust management model without filtering feedbacks in P2P networks Xianfu MengGe Zhang OriginalPaper 28 March 2019 Pages: 175 - 189
An overlay management strategy to improve QoS in CDN-P2P live streaming systems Shilpa BudhkarVenkatesh Tamarapalli OriginalPaper 25 April 2019 Pages: 190 - 206
Multi-keyword ranked searchable encryption scheme with access control for cloud storage Maryam ZarezadehHamid MalaMaede Ashouri-Talouki OriginalPaper 30 April 2019 Pages: 207 - 218
Energy efficient technique for P2P multisource video streaming in mobile ad hoc networks to improve QoE Muhammad Salman RaheelRaad Raad OriginalPaper 08 May 2019 Pages: 219 - 242
Topological influence on optimality of Tit-for-Tat based P2P content distribution Masahiro Sasabe OriginalPaper 17 May 2019 Pages: 243 - 254
An energy efficient data transmission approach for low-duty-cycle wireless sensor networks Jian WuZhigang ChenYedong Zhao OriginalPaper 04 June 2019 Pages: 255 - 268
An effective positive transmission routing algorithm based on social relationships in opportunistic social networks Peng ZhengHongxiao FeiYeqing Yan OriginalPaper 17 June 2019 Pages: 269 - 286
A parallel optimization for energy and robustness of file distribution services Dongchao MaGuangxing HanChengan Zhao OriginalPaper 20 June 2019 Pages: 287 - 303
An approach by adopting multi-objective clustering and data collection along with node sleep scheduling for energy efficient and delay aware WSN B. GuruprakashC. BalasubramanianR. Sukumar OriginalPaper 29 July 2019 Pages: 304 - 319
Assessment of coverage quality of sensor networks for IoT applications Amr ElsaadanyKhalid Khalil OriginalPaper 05 August 2019 Pages: 320 - 332
Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses Monali MavaniKrishna Asawa OriginalPaper 14 August 2019 Pages: 333 - 347
A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography Gaurav SrivastavaRicha AgrawalKshirasagar Naik OriginalPaper 14 August 2019 Pages: 348 - 367
A balanced strategy to improve data invulnerability in structured P2P system Xiaogang QiMin QiangLifang Liu OriginalPaper 19 August 2019 Pages: 368 - 387
EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups Sneha KanchanGarima SinghNarendra S. Chaudhari OriginalPaper 20 August 2019 Pages: 388 - 411
Achieve privacy-preserving simplicial depth query over collaborative cloud servers Hassan MahdikhaniRasoul ShahsavarifarDavid Bremner OriginalPaper 30 August 2019 Pages: 412 - 423