


default search action
International Journal of Internet Protocol Technology, Volume 16
Volume 16, Number 1, 2023
- Hai-Yan Kang

, Jie Deng:
A cross encryption scheme for data security storage in cloud computing environment. 1-10 - Ummer Iqbal, Ajaz Hussain Mir:

Practical and scalable access control mechanism for wireless sensor networks. 11-33 - Shilpee Prasad, B. R. Purushothama:

Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server. 34-45 - Rushdi A. Hamamreh, Mohammed R. Ayyad, Mohammed AbuTaha:

RAD: reinforcement authentication model based on DYMO protocol for MANET. 46-57 - Haiyan Kang

, Yaping Feng, Xiameng Si, Kaili Lu:
Research on personalised privacy-preserving model of multi-sensitive attributes. 58-67 - Bhushana Samyuel Neelam, Benjamin A. Shimray:

Improved network performance in CPS communication with distributed IPC mechanisms of recursive internetworking architecture (RINA). 68-74
Volume 16, Number 2, 2023
- Inès Mouakher, Fatma Dhaou

, J. Christian Attiogbé:
Validating and verifying LwM2M clients with event-B. 75-91 - J. Viji Gripsy

, K. R. Kanchana:
Relaxed hybrid routing to prevent consecutive attacks in mobile ad-hoc networks. 92-98 - Wei Luo:

Cognitive wireless communication network information sharing method based on blockchain technology. 99-109 - Bhavika Gambhava

, C. K. Bhensdadia:
Mathematical modelling of packet transmission during reclamation period in NewReno TCP and CTCP. 110-118 - Sandeep Patil

, Lalita S. Admuthe, Meenakshi R. Patil
:
SNTAM: secure neuro-fuzzy-based trusted neighbour selection and attackers detection in multipath ad-hoc network. 119-130
Volume 16, Number 3, 2023
- S. Narasimha Prasad, K. Senthamil Selvan

, B. Lakshmi Dhevi, A. Niranjil Kumar:
Computation on scheduling attacks and optimal resource utilisation in wireless sensor networks via optimisation techniques. 131-137 - Sana Zeba, Mohammad Amjad:

Distribution and tracking current live location of recognised criminal face at decentralised blockchain through image. 138-147 - Tianfang Yu, Xue-Song Qiu:

Towards a transmission control mechanism for data centres based on flow deadline and size over software defined networking. 148-160 - Vivek Kumar Jaiswal, Sanjeev Patel:

A comparative performance analysis of TCP congestion control algorithm: elastic TCP vs. e-Elastic TCP. 161-175 - Ankit Verma, Suman Deswal:

Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks. 176-184
Volume 16, Number 4, 2023
- Heng Du:

Smart approach to constraint programming: intelligent backtracking using artificial intelligence. 185-195 - Haiyan Kang

, Ying Li, Shasha Zhang:
An effective differential privacy protection method of location data based on perturbation loss constraint. 196-203 - Warodom Werapun, Jakapan Suaboot, Piyawit Tantisarkhornkhet, Jirawat Thaenthong:

SVC-MST BWQLB multicast over software-defined networking. 204-216 - N. Ashokkumar, N. S. Kavitha

, M. Lakshmi, Ashok Vajravelu:
A constant temperature control system for indoor environments in buildings using internet of things. 217-225 - Kaoutar Bazi, Bouchaib Nassereddine:

Enhanced TCP BBR performance in wireless mesh networks (WMNs) and next-generation high-speed 5G networks. 226-239

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














