default search action
Journal of Network and Computer Applications, Volume 134
Volume 134, May 2019
- Tong Wang, Leszek Lilien:
Opportunistic topology control for ad hoc wireless network survivability enhancement based on LIMOS model. 1-12 - Lichuan Ma, Qingqi Pei, Yong Xiang, Lina Yao, Shui Yu:
A reliable reputation computation framework for online items in E-commerce. 13-25 - Huiying Hou, Jia Yu, Rong Hao:
Cloud storage auditing with deduplication supporting different security levels according to data popularity. 26-39 - Kai Guo, Mingcong Yang, Yongbing Zhang, Xiaohua Jia:
Efficient resource assignment in mobile edge computing: A dynamic congestion-aware offloading approach. 40-51
- JiLiang Li, WeiGuo Zhang, Vivek Dabra, Kim-Kwang Raymond Choo, Saru Kumari, Dieter Hogrefe:
AEP-PPA: An anonymous, efficient and provably-secure privacy-preserving authentication protocol for mobile services in smart cities. 52-61 - Yongxin Liu, Jianqiang Li, Zhong Ming, Houbing Song, Xiaoxiong Weng, Jian Wang:
Domain-specific data mining for residents' transit pattern retrieval from incomplete information. 62-71 - Su Peng, Fucai Zhou, Jin Li, Qiang Wang, Zifeng Xu:
Efficient, dynamic and identity-based Remote Data Integrity Checking for multiple replicas. 72-88 - Gang Sun, Siyu Sun, Jian Sun, Hongfang Yu, Xiaojiang Du, Mohsen Guizani:
Security and privacy preservation in fog-based crowd sensing on the internet of vehicles. 89-99 - (Withdrawn) An approach for predicting health status in IoT health care. 100-113
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.