Showing results 15 to 34 of 129
< previous
next >
Issue Date | Title | Author(s) |
2023-06-19 | C-Block: A Secure and Robust Framework for Authentication Handover in 5G HetNets based on Edge-enabled SDN/NFV Environments | Nanda, P; Khan, AF |
2021-06-28 | Context-aware Fog Computing Implementation for Industrial Internet of Things | Nanda, P; Atieh, A; Mohanty, M |
2011-10-31 | Credibility problems and tradeoff between realistic and abstraction in WANET and WSN Simulation | Yu, D; Nanda, P; Braun, R |
2018-07-27 | CTOM: Collaborative task offloading mechanism for mobile cloudlet networks | Fan, X; He, X; Puthal, D; Chen, S; Xiang, C; Nanda, P; Rao, X |
2021-12-03 | Data Engineering for Smart Systems Proceedings of SSIC 2021 | Nanda, P |
2015-12-02 | Data mobility management model for active data cubes | Dang, TD; Hoang, D; Nanda, P |
2017 | Data Protection and Mobility Management for Cloud | Dang, D; Hoang, DB; Nanda, P; Kumar, V; Ko, R; Chaisiri, S |
2016-01-01 | Data sharing in secure multimedia wireless sensor networks | Usman, M; Jan, MA; He, X; Nanda, P |
2020-09-03 | Deep learning for intelligent traffic sensing and prediction: recent
advances and future challenges | Nanda, P; Fan, X; He, X |
2011-11-28 | Denial-of-service attack detection based on multivariate correlation analysis | Tan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP |
2023-12-13 | Designing Incentive Mechanisms for Fair Participation in Federated Learning | Nanda, P; Xu, H; Liang, J |
2015-09-01 | Detection of Denial-of-Service Attacks Based on Computer Vision Techniques | Tan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP; Hu, J |
2023-08 | Differential privacy model for blockchain based smart home architecture | Qashlan, A; Nanda, P; Mohanty, M |
2019-12-10 | Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and Communications | Nanda, P; Puthal, D; Mohanty, SP |
2007-12-01 | Effect of network policies on internet traffic engineering | Nanda, P; Simmonds, AJ |
2019-01-01 | Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme | Liu, M; Luo, Y; Nanda, P; Yu, S; Zhang, J |
2023-08 | Enabling secure lightweight mobile Narrowband Internet of Things (NB-IoT) applications using blockchain | Mohan, VS; Sankaran, S; Nanda, P; Achuthan, K |
2013-09-09 | Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN | Jan, MA; Nanda, P; He, X |
2014-01-01 | Enhancing big data security with collaborative intrusion detection | Tan, Z; Nagar, UT; He, X; Nanda, P; Liu, RP; Wang, S; Hu, J |
2014-09-01 | Enhancing Big Data Security with Collaborative Intrusion Detection | Tan, Z; Nagar, U; He, X; Nanda, P; Liu, R |