Showing results 70 to 89 of 110
< previous
next >
Issue Date | Title | Author(s) |
2018-11-01 | On the placement of controllers in software-Defined-WAN using meta-heuristic approach | Sahoo, KS; Puthal, D; Obaidat, MS; Sarkar, A; Mishra, SK; Sahoo, B |
2018-07-31 | An Overview of Security Challenges in Vehicular Ad-Hoc Networks | Malik, N; Puthal, D; Nanda, P |
2020-04-01 | PAAL: A Framework Based on Authentication, Aggregation, and Local Differential Privacy for Internet of Multimedia Things | Usman, M; Jan, MA; Puthal, D |
2018-06-01 | Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait | Khan, F; ur Rehman, A; Usman, M; Tan, Z; Puthal, D |
2021-11-01 | Personal Internet of Things (PIoT): What Is It Exactly? | Sahoo, BPS; Mohanty, SP; Puthal, D; Pillai, P |
2019-08-01 | PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things | Yanambaka, VP; Mohanty, SP; Kougianos, E; Puthal, D |
2019-03-12 | A predictive load balancing technique for software defined networked cloud services | Yang, CT; Chen, ST; Liu, JC; Su, YW; Puthal, D; Ranjan, R |
2021-08-01 | Preserving Privacy in the Internet of Connected Vehicles | Ghane, S; Jolfaei, A; Kulik, L; Ramamohanarao, K; Puthal, D |
2020-01-01 | Privacy-preserving cooperative localization in vehicular edge computing infrastructure | Chandra Shit, R; Sharma, S; Watters, P; Yelamarthi, K; Pradhan, B; Davison, R; Morgan, G; Puthal, D |
2017-09-07 | Privacy-preserving detection of statically mutually exclusive roles constraints violation in interoperable role-based access control | Liu, M; Zhang, X; Yang, C; Pang, S; Puthal, D; Ren, K |
2018-01-01 | Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control | Liu, M; Luo, Y; Yang, C; Pang, S; Puthal, D; Ren, K; Zhang, X |
2017-04-04 | Private matching and set intersection computation in multi-agent and industrial control systems | Rasheed, A; Kenneth, A; Mahapatra, R; Puthal, D |
2019-01-01 | Proof of Authentication: IoT-Friendly Blockchains | Puthal, D; Mohanty, SP |
2019-03-06 | Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems | Puthal, D; Mohanty, SP; Nanda, P; Kougianos, E; Das, G |
2017-01-01 | Rendezvous based routing protocol for wireless sensor networks with mobile sink | Sharma, S; Puthal, D; Jena, SK; Zomaya, AY; Ranjan, R |
2018-09-01 | Response time optimization for cloudlets in Mobile Edge Computing | Tiwary, M; Puthal, D; Sahoo, KS; Sahoo, B; Yang, LT |
2021-01-01 | Running Industrial Workflow Applications in a Software-defined Multi-Cloud Environment using Green Energy Aware Scheduling Algorithm | Wen, Z; Garg, S; Aujla, GSS; Alwasel, K; Puthal, D; Dustdar, S; Zomaya, AY; Rajan, R |
2019-03-20 | S2R: Service trading based response time optimization in mobile edge computing | Mishra, P; Tiwary, M; Yang, LT; Puthal, D |
2022-05-23 | SE-Loc: Security-Enhanced Indoor Localization with Semi-Supervised Deep Learning | Ye, Q; Fan, X; Bie, H; Puthal, D; Wu, T; Song, X; Fang, G |
2018-05-01 | Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing | Puthal, D; Obaidat, MS; Nanda, P; Prasad, M; Mohanty, SP; Zomaya, AY |