A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET Hui XieJun ZhengChangzhen Hu OriginalPaper 15 February 2024 Pages: 569 - 584
GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks K. DineshSanthosh Kumar SVN OriginalPaper 05 January 2024 Pages: 585 - 611
SAKMR: Industrial control anomaly detection based on semi-supervised hybrid deep learning Shijie TangYong DingHuiyong Wang OriginalPaper 09 January 2024 Pages: 612 - 623
Secret sharing based RFID protocol using ECC for TMIS Haradhan GhoshPramod Kumar MauryaSatya Bagchi OriginalPaper 09 January 2024 Pages: 624 - 638
CIM: CP-ABE-based identity management framework for collaborative edge storage Chunjiao LiLiangmin WangYue Fei OriginalPaper 11 January 2024 Pages: 639 - 655
Flexible symmetric predicate encryption for data privacy in IoT environments Qingquan BianYue ZhangAxin Wu OriginalPaper 11 January 2024 Pages: 656 - 664
PGASH: Provable group-based authentication scheme for Internet of Healthcare Things Chandan TrivediKeyur ParmarUdai Pratap Rao OriginalPaper 12 January 2024 Pages: 665 - 684
A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks Min LiuLiangliang WangBaodong Qin OriginalPaper 15 January 2024 Pages: 685 - 700
SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network Anurag ShuklaSarsij TripathiDeepak Singh OriginalPaper 17 January 2024 Pages: 701 - 721
Hybrid optimized task scheduling with multi-objective framework for crowd sensing in mobile social networks Sasireka VShyamala Ramachandran OriginalPaper 18 January 2024 Pages: 722 - 738
A bibliometric analysis of blockchain development in industrial digital transformation using CiteSpace Xin SuShengwen WangRenzhu Yu OriginalPaper 20 January 2024 Pages: 739 - 755
A low-cost blockchain node deployment algorithm for the internet of things Xinyu LaiYouchi ZhangHaoxiang Luo OriginalPaper 23 January 2024 Pages: 756 - 766
Heuristic-aided multi-objective function for satellite controller placement and routing in integrated satellite terrestrial network V. DeepaB. Sivakumar OriginalPaper 24 January 2024 Pages: 767 - 783
Preserving location privacy against inference attacks in indoor positioning system D Hemkumar OriginalPaper 24 January 2024 Pages: 784 - 799
A Blockchain-based Privacy Protection Protocol using Smart Contracts in LEO satellite networks Xia DengJunbin ShaoJunbin Liang OriginalPaper 24 January 2024 Pages: 800 - 818
Grouped federated learning for time-sensitive tasks in industrial IoTs Jiangshan HaoLinghao ZhangYanchao Zhao OriginalPaper 26 January 2024 Pages: 819 - 833
DRIVE: Dual rider-remora optimization for vehicular routing Gurjot KaurDeepti Kakkar OriginalPaper 31 January 2024 Pages: 834 - 857
Extended chaotic map-based key management for hierarchical access control in e-medicine systems Tian-Fu LeeI-Pin ChangRui-Yu Chen OriginalPaper 31 January 2024 Pages: 858 - 870
Anonymous credentials for the internet of vehicles Yi GongHongbin LiangYiting Yao OriginalPaper 31 January 2024 Pages: 871 - 880
Tangent Pelican search optimization for block assignment in blockchain based IoT S. VinuB. Diwan OriginalPaper 31 January 2024 Pages: 881 - 895
Towards driver distraction detection: a privacy-preserving federated learning approach Wenguang ZhouZhiwei JiaLing Li OriginalPaper 05 February 2024 Pages: 896 - 910
A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm Sahaya Stalin Jose GSugitha GPreethi B. C OriginalPaper 06 February 2024 Pages: 911 - 923
MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system Anuradha MJean Justus JMary Immaculate Sheela L OriginalPaper 06 February 2024 Pages: 924 - 943
A website fingerprinting technology with time-sampling Xueshu HongShaoyong LiFan Wu OriginalPaper 06 February 2024 Pages: 944 - 960
Design and implementation of anchor coprocessor architecture for wireless node localization applications Rathindra Nath BiswasAnurup SahaMrinal Kanti Naskar OriginalPaper 07 February 2024 Pages: 961 - 984
A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage Xingchen LiuShaohui ZhangReza Malekian OriginalPaper 07 February 2024 Pages: 985 - 1000
Socially-aware and privacy-preserving multi-objective worker recruitment in mobile crowd sensing Yanming FuShenglin LuBocheng Huang OriginalPaper 08 February 2024 Pages: 1001 - 1019
Retraction Note: Issues of crowdsourcing and mobile app development through the intellectual property protection of third parties Zhijiang LiuViktor Shestak Retraction Note 05 January 2024 Pages: 1020 - 1020