Browsing byAuthorPuthal, D

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 71 to 90 of 110< previous   next >
Issue DateTitleAuthor(s)
2018-07-31An Overview of Security Challenges in Vehicular Ad-Hoc NetworksMalik, N; Puthal, D; Nanda, P
2020-04-01PAAL: A Framework Based on Authentication, Aggregation, and Local Differential Privacy for Internet of Multimedia ThingsUsman, M; Jan, MA; Puthal, D
2018-06-01Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-WaitKhan, F; ur Rehman, A; Usman, M; Tan, Z; Puthal, D
2021-11-01Personal Internet of Things (PIoT): What Is It Exactly?Sahoo, BPS; Mohanty, SP; Puthal, D; Pillai, P
2019-08-01PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical ThingsYanambaka, VP; Mohanty, SP; Kougianos, E; Puthal, D
2019-03-12A predictive load balancing technique for software defined networked cloud servicesYang, CT; Chen, ST; Liu, JC; Su, YW; Puthal, D; Ranjan, R
2021-08-01Preserving Privacy in the Internet of Connected VehiclesGhane, S; Jolfaei, A; Kulik, L; Ramamohanarao, K; Puthal, D
2020-01-01Privacy-preserving cooperative localization in vehicular edge computing infrastructureChandra Shit, R; Sharma, S; Watters, P; Yelamarthi, K; Pradhan, B; Davison, R; Morgan, G; Puthal, D
2017-09-07Privacy-preserving detection of statically mutually exclusive roles constraints violation in interoperable role-based access controlLiu, M; Zhang, X; Yang, C; Pang, S; Puthal, D; Ren, K
2018-01-01Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access controlLiu, M; Luo, Y; Yang, C; Pang, S; Puthal, D; Ren, K; Zhang, X
2017-04-04Private matching and set intersection computation in multi-agent and industrial control systemsRasheed, A; Kenneth, A; Mahapatra, R; Puthal, D
2019-01-01Proof of Authentication: IoT-Friendly BlockchainsPuthal, D; Mohanty, SP
2019-03-06Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed SystemsPuthal, D; Mohanty, SP; Nanda, P; Kougianos, E; Das, G
2017-01-01Rendezvous based routing protocol for wireless sensor networks with mobile sinkSharma, S; Puthal, D; Jena, SK; Zomaya, AY; Ranjan, R
2018-09-01Response time optimization for cloudlets in Mobile Edge ComputingTiwary, M; Puthal, D; Sahoo, KS; Sahoo, B; Yang, LT
2021-01-01Running Industrial Workflow Applications in a Software-defined Multi-Cloud Environment using Green Energy Aware Scheduling AlgorithmWen, Z; Garg, S; Aujla, GSS; Alwasel, K; Puthal, D; Dustdar, S; Zomaya, AY; Rajan, R
2019-03-20S2R: Service trading based response time optimization in mobile edge computingMishra, P; Tiwary, M; Yang, LT; Puthal, D
2022-05-23SE-Loc: Security-Enhanced Indoor Localization with Semi-Supervised Deep LearningYe, Q; Fan, X; Bie, H; Puthal, D; Wu, T; Song, X; Fang, G
2018-05-01Secure and Sustainable Load Balancing of Edge Data Centers in Fog ComputingPuthal, D; Obaidat, MS; Nanda, P; Prasad, M; Mohanty, SP; Zomaya, AY
2019-02-01Secure authentication and load balancing of distributed edge datacentersPuthal, D; Ranjan, R; Nanda, A; Nanda, P; Jayaraman, PP; Zomaya, AY