Browsing by Author Puthal, D

0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 48 to 67 of 72< previous   next >
Issue DateTitleAuthor(s)
1-Jun-2018Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-WaitKhan, F; ur Rehman, A; Usman, M; Tan, Z; Puthal, D
12-Mar-2019A predictive load balancing technique for software defined networked cloud servicesYang, CT; Chen, ST; Liu, JC; Su, YW; Puthal, D; Ranjan, R
7-Sep-2017Privacy-preserving detection of statically mutually exclusive roles constraints violation in interoperable role-based access controlLiu, M; Zhang, X; Yang, C; Pang, S; Puthal, D; Ren, K
1-Jan-2018Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access controlLiu, M; Luo, Y; Yang, C; Pang, S; Puthal, D; Ren, K; Zhang, X
4-Apr-2017Private matching and set intersection computation in multi-agent and industrial control systemsRasheed, A; Kenneth, A; Mahapatra, R; Puthal, D
1-Jan-2019Proof of Authentication: IoT-Friendly BlockchainsPuthal, D; Mohanty, SP
6-Mar-2019Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed SystemsPuthal, D; Mohanty, SP; Nanda, P; Kougianos, E; Das, G
1-Jan-2017Rendezvous based routing protocol for wireless sensor networks with mobile sinkSharma, S; Puthal, D; Jena, SK; Zomaya, AY; Ranjan, R
1-Sep-2018Response time optimization for cloudlets in Mobile Edge ComputingTiwary, M; Puthal, D; Sahoo, KS; Sahoo, B; Yang, LT
20-Mar-2019S2R: Service trading based response time optimization in mobile edge computingMishra, P; Tiwary, M; Yang, LT; Puthal, D
1-May-2018Secure and Sustainable Load Balancing of Edge Data Centers in Fog ComputingPuthal, D; Obaidat, MS; Nanda, P; Prasad, M; Mohanty, SP; Zomaya, AY
1-Feb-2019Secure authentication and load balancing of distributed edge datacentersPuthal, D; Ranjan, R; Nanda, A; Nanda, P; Jayaraman, PP; Zomaya, AY
31-Jul-2018Secure Authentication Protocol for IoT ArchitectureSahu, AK; Sharma, S; Puthal, D; Pandey, A; Shit, R
1-Jan-2016A Secure Big Data Stream Analytics Framework for Disaster Management on the CloudPuthal, D; Nepal, S; Ranjan, R; Chen, J; Chen, J; Yang, LT
20-Jan-2017A secure big data stream analytics framework for disaster management on the cloudPuthal, D; Nepal, S; Ranjan, R; Chen, J
14-Dec-2016A Secure Big Data Streams Analytics Farmework for Disater Management on CloudPuthal, D; Nepal, S; Ranjan, R; Chen, JINJUN
1-Nov-2018Secure Computing for the Internet of Things and Network Edges Protecting communication in the worldwide network of devicesPuthal, D; Zhang, X
7-Sep-2017Secure-GLOR: An adaptive secure routing protocol for dynamic wireless mesh networksNanda, A; Nanda, P; He, X; Jamdagni, A; Puthal, D
31-Jul-2018Self Deployment Based on Circle Packing Algorithm for Movement Assisted Wireless Sensor NetworksShit, RC; Sharma, S; Puthal, D; Panday, A
1-Jan-2018Software Defined Network Based Fault Detection in Industrial Wireless Sensor NetworksBhoi, SK; Obaidat, MS; Puthal, D; Singh, M; Hsiao, KF