Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems Chang XuJiachen WangCan Zhang OriginalPaper 18 March 2021 Pages: 1841 - 1853
Tree-searching based trust assessment through communities in vehicular networks Zhong LiXueting YangChangjun Jiang OriginalPaper 23 March 2021 Pages: 1854 - 1868
Correction to: A digital rights management system based on a scalable blockchain Abba GarbaAshutosh Dhar DwivediZhong Chen Correction 25 March 2021 Pages: 1869 - 1869
Energy efficient and link reliable routing (E2LR) scheme for underwater sensor networks Moeenuddin TariqMuhammad AyazM. Zahid Abbas OriginalPaper 25 March 2021 Pages: 1870 - 1888
iForest: An informed resource search strategy in mobile P2P networks Shuai ZhouTing ZhangXianfu Meng OriginalPaper 31 March 2021 Pages: 1889 - 1904
Reliable scheduling and load balancing for requests in cloud-fog computing Fayez AlqahtaniMohammed AmoonAida A. Nasr OriginalPaper 31 March 2021 Pages: 1905 - 1916
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks Efat YousefpoorHamid BaratiAli Barati OriginalPaper 01 April 2021 Pages: 1917 - 1942
A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications Kavita JaiswalVeena Anand OriginalPaper 08 April 2021 Pages: 1943 - 1962
Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks Xu QinGuanglun HuangCheng Li OriginalPaper 16 April 2021 Pages: 1963 - 1975
A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust D. RajeshD. Giji Kiruba OriginalPaper 16 April 2021 Pages: 1976 - 1987
P2P mobility management for seamless handover using D2D communication in B5G wireless technology Shubhanshi SinghDrishti KediaP. Prakasam OriginalPaper 17 April 2021 Pages: 1988 - 1997
Radial kernelized regressive merkle–damgård cryptographic hash blockchain for secure data transmission with IoT sensor node Yuvaraj NMohanraj P OriginalPaper 19 April 2021 Pages: 1998 - 2010
A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles Chengzhe LaiYangyang DuDong Zheng OriginalPaper 20 April 2021 Pages: 2011 - 2025
Traffic sign detection and recognition using RGSM and a novel feature extraction method M. SudhaDr.V.P. Galdis pushparathi OriginalPaper 21 April 2021 Pages: 2026 - 2037
Delay - aware bandwidth estimation and intelligent video transcoder in mobile cloud S.P. TamizhselviVijayalakshmi Muthuswamy OriginalPaper 01 May 2021 Pages: 2038 - 2060
A self-localization range free protocol for wireless sensor networks Souhila SilmiZouina DoukhaSamira Moussaoui OriginalPaper 02 May 2021 Pages: 2061 - 2071
Hybrid fuzzy logic and artificial Flora optimization algorithm-based two tier cluster head selection for improving energy efficiency in WSNs Ramakrishnan Anandkumar OriginalPaper 08 May 2021 Pages: 2072 - 2083
An energy aware modified PAM clustering with cluster head modulation in Mobile cloud sensor environment S. Jeen SheneW. R. Sam Emmanuel OriginalPaper 08 May 2021 Pages: 2084 - 2098
Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing Chunhai LiXiaohuan LiFeng Zhao OriginalPaper 11 May 2021 Pages: 2099 - 2114
Joint optimization for throughput maximization in underwater acoustic networks with energy harvesting Zhixin LiuXiangyun MengKit Yan Chan OriginalPaper 14 May 2021 Pages: 2115 - 2126
Analysis of minimum distribution time of tit-for-tat-based P2P file distribution: Linear programming based approach Masahiro Sasabe OriginalPaper 17 May 2021 Pages: 2127 - 2138
Energy and delay-ware massive task scheduling in fog-cloud computing system Mengying JiaJie ZhuHaiping Huang OriginalPaper 23 May 2021 Pages: 2139 - 2155
Efficient and privacy-preserving range-max query in fog-based agricultural IoT Min ZhouYandong ZhengRongxing Lu OriginalPaper 25 May 2021 Pages: 2156 - 2170
MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud Xiaopeng YangHui ZhuHui Li OriginalPaper 25 May 2021 Pages: 2171 - 2186
A critical analysis of RPL objective functions in internet of things paradigm Neeti GuptaAnuradha PughatVidushi Sharma OriginalPaper 25 May 2021 Pages: 2187 - 2208
Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system Ramaprabha JayaramS. Prabakaran OriginalPaper 27 May 2021 Pages: 2209 - 2223
A deep learning-based constrained intelligent routing method Zheheng RaoYanyan XuShaoming Pan OriginalPaper 03 June 2021 Pages: 2224 - 2235
Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks Lunzhi DengJianxin ShaoZhenyu Hu OriginalPaper 03 June 2021 Pages: 2236 - 2247
Joint offloading and energy optimization for wireless powered mobile edge computing under nonlinear EH Model Hua ShiRonghua LuoGuan Gui OriginalPaper 03 June 2021 Pages: 2248 - 2261
One radish, One hole: Specific adversarial training for enhancing neural network’s robustness Yun ZhangHongwei LiXiaoming Huang OriginalPaper 07 June 2021 Pages: 2262 - 2274
RETRACTED ARTICLE: SPAHN novel approach for PL-AG gateway discovery for internet connectivity K. KannanP. SivaranjaniP. Sanjeevi OriginalPaper 26 May 2020 Pages: 2275 - 2284
MDRP: Message dissemination with re-route planning method for emergency vehicle information exchange R. P. Meenaakshi SundhariL. MuraliP. Mohamed Shakeel OriginalPaper 01 June 2020 Pages: 2285 - 2294
Scalable aggregation plan (SAP) for portable network in a box (NIB) architecture Torki AltameemAyman Altameem OriginalPaper 05 June 2020 Pages: 2295 - 2305
CAN bus network design of bifurcated power electric tractor Liu MengnanHan BingLi Yanying OriginalPaper 08 June 2020 Pages: 2306 - 2315
Transmission adaptive mode selection (TAMS) method for internet of things device energy management Mohammed Al-Ma’aitahAyed AlwadainAldosary Saad OriginalPaper 09 June 2020 Pages: 2316 - 2326
Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection K. NirmalB. JanetR. Kumar OriginalPaper 20 June 2020 Pages: 2327 - 2339
SRAF: Scalable Resource Allocation Framework using Machine Learning in user-Centric Internet of Things Zafer Al-MakhadmehAmr Tolba OriginalPaper 21 June 2020 Pages: 2340 - 2350
Effective power allocation and distribution for 6 g – network in a box enabled peer to peer wireless communication networks V. K. GnanavelA. Srinivasan OriginalPaper 22 June 2020 Pages: 2351 - 2360
A novel clustering technique to stop congestion occur vehicular ad-hoc networks using node density based on received signal strength R. ReginT. Menakadevi OriginalPaper 17 July 2020 Pages: 2361 - 2371
A novel predicate based access control scheme for cloud environment using open stack swift storage Chunduru AnilkumarSumathy Subramanian OriginalPaper 26 July 2020 Pages: 2372 - 2384
A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment Deevi Radha RaniG. Geethakumari OriginalPaper 31 July 2020 Pages: 2385 - 2398
Privacy preserving E-voting cloud system based on ID based encryption Achyut ShankarP. PandiarajaPavika Sharma OriginalPaper 07 August 2020 Pages: 2399 - 2409
High utility itemset mining using path encoding and constrained subset generation Vamsinath JavangulaSuvarna Vani KoneruHaritha Dasari OriginalPaper 22 August 2020 Pages: 2410 - 2418
Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions D. PreethiNeelu Khare OriginalPaper 26 August 2020 Pages: 2419 - 2429
FAST: Fast Accessing Scheme for data Transmission in cloud computing Suyel NamasudraRupak ChakrabortyBharat S. Rawal OriginalPaper 28 August 2020 Pages: 2430 - 2442
An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment Silambarasan Elkana EbinazerNickolas SavarimuthuMary Saira Bhanu S OriginalPaper 28 August 2020 Pages: 2443 - 2451
A novel energy-efficient data aggregation protocol for cognitive radio based wireless multimedia networks C. Rajesh BabuB. Amutha OriginalPaper 29 August 2020 Pages: 2452 - 2461
PriPresent: an embedded prime LightWeight block cipher for smart devices M. GirijaP. ManickamM. Ramaswami OriginalPaper 07 September 2020 Pages: 2462 - 2472
An optimistic technique to detect Cache based Side Channel attacks in Cloud G. SangeethaG. Sumathi OriginalPaper 07 September 2020 Pages: 2473 - 2486
Dynamic intelligent resource allocation for emergency situations Chang Zhi-xian OriginalPaper 11 September 2020 Pages: 2487 - 2494