Found: 25
Select item for more details and to access through your institution.
Attribute‐based encryption scheme for secure data sharing in cloud with fine‐grained revocation.
- Published in:
- Security & Privacy, 2024, v. 7, n. 1, p. 1, doi. 10.1002/spy2.336
- By:
- Publication type:
- Article
Emotional Health and Climate-Change-Related Stressor Extraction from Social Media: A Case Study Using Hurricane Harvey.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 24, p. 4910, doi. 10.3390/math11244910
- By:
- Publication type:
- Article
An efficient moving object tracking framework for WSNs using sequence-to-sequence learning model.
- Published in:
- Peer-to-Peer Networking & Applications, 2021, v. 14, n. 6, p. 3915, doi. 10.1007/s12083-021-01157-8
- By:
- Publication type:
- Article
Catora: congestion avoidance through transmission ordering and resource awareness in delay tolerant networks.
- Published in:
- Wireless Networks (10220038), 2020, v. 26, n. 8, p. 5919, doi. 10.1007/s11276-020-02416-x
- By:
- Publication type:
- Article
Analysis of a cloud migration framework for offline risk assessment of cloud service providers.
- Published in:
- Software: Practice & Experience, 2020, v. 50, n. 6, p. 998, doi. 10.1002/spe.2809
- By:
- Publication type:
- Article
Economic Incentive Schemes for Improving Availability of Rare Data in Mobile-P2P Networks.
- Published in:
- International Journal of Next-Generation Computing, 2017, v. 8, n. 1, p. 1
- By:
- Publication type:
- Article
Top- k query processing in mobile-P2P networks using economic incentive schemes.
- Published in:
- Peer-to-Peer Networking & Applications, 2016, v. 9, n. 4, p. 731, doi. 10.1007/s12083-015-0391-6
- By:
- Publication type:
- Article
Protocols for mitigating blackhole attacks in delay tolerant networks.
- Published in:
- Wireless Networks (10220038), 2016, v. 22, n. 1, p. 235, doi. 10.1007/s11276-015-0959-3
- By:
- Publication type:
- Article
Multi-party encryption (MPE): secure communications in delay tolerant networks.
- Published in:
- Wireless Networks (10220038), 2015, v. 21, n. 4, p. 1243, doi. 10.1007/s11276-014-0848-1
- By:
- Publication type:
- Article
A Survey of Methods for Finding Outliers in Wireless Sensor Networks.
- Published in:
- Journal of Network & Systems Management, 2015, v. 23, n. 1, p. 163, doi. 10.1007/s10922-013-9287-z
- By:
- Publication type:
- Article
Efficient Data Distribution and Sharing in Mobile Cloud Computing.
- Published in:
- International Journal of Next-Generation Computing, 2014, v. 5, n. 3, p. 200
- By:
- Publication type:
- Article
Sensor Cloud: A Cloud of Virtual Sensors.
- Published in:
- IEEE Software, 2014, v. 31, n. 2, p. 70, doi. 10.1109/MS.2013.141
- By:
- Publication type:
- Article
Social group detection based routing in Delay Tolerant Networks.
- Published in:
- Wireless Networks (10220038), 2013, v. 19, n. 8, p. 1979, doi. 10.1007/s11276-013-0580-2
- By:
- Publication type:
- Article
Data Replication in Cooperative Mobile Ad-Hoc Networks.
- Published in:
- Mobile Networks & Applications, 2013, v. 18, n. 2, p. 237, doi. 10.1007/s11036-012-0393-z
- By:
- Publication type:
- Article
Dynamic XML View Creation And Update Propogation Using Relational Database.
- Published in:
- International Journal of Next-Generation Computing, 2010, v. 1, n. 2, p. 168
- By:
- Publication type:
- Article
DATA DISSEMINATION METHODS FOR TIME-CONSTRAINT APPLICATIONS IN MOBILE AD HOC NETWORKS.
- Published in:
- Journal of Interconnection Networks, 2008, v. 9, n. 4, p. 351, doi. 10.1142/S0219265908002321
- By:
- Publication type:
- Article
ESecRout: An Energy Efficient Secure Routing for Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2008, v. 4, n. 2, p. 67, doi. 10.1080/15501320802001101
- By:
- Publication type:
- Article
ESecRout: An Energy Efficient Secure Routing for Sensor Networks *.
- Published in:
- International Journal of Distributed Sensor Networks, 2008, v. 4, n. 2, p. 67, doi. 10.1080/15501320802001101
- By:
- Publication type:
- Article
Pervasive data access in wireless and mobile computing environments.
- Published in:
- Wireless Communications & Mobile Computing, 2008, v. 8, n. 1, p. 25, doi. 10.1002/wcm.424
- By:
- Publication type:
- Article
Two energy efficient algorithms for tracking objects in a sensor network.
- Published in:
- Wireless Communications & Mobile Computing, 2007, v. 7, n. 6, p. 809, doi. 10.1002/wcm.423
- By:
- Publication type:
- Article
APPROXIMATE QUERY PROCESSING USING MULTILAYERED DATA MODEL TO HANDLE ENVIRONMENTAL CONSTRAINTS, PRIVACY AND AVOIDING INFERENCES.
- Published in:
- International Journal of Cooperative Information Systems, 2007, v. 16, n. 2, p. 177, doi. 10.1142/S0218843007001627
- By:
- Publication type:
- Article
Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2007, v. 3, n. 2, p. 201, doi. 10.1080/15501320701205225
- By:
- Publication type:
- Article
Representation of Web Data in A Web Warehouse.
- Published in:
- Computer Journal, 2003, v. 46, n. 3, p. 229, doi. 10.1093/comjnl/46.3.229
- By:
- Publication type:
- Article
Formalization and Proof of Correctness of the Crash Recovery Algorithm for an Open and Safe Nested Transaction Model.
- Published in:
- International Journal of Cooperative Information Systems, 2001, v. 10, n. 1/2, p. 1, doi. 10.1142/S0218843001000242
- By:
- Publication type:
- Article
Data Visualization Operators for Whoweda.
- Published in:
- Computer Journal, 2000, v. 43, n. 5, p. 364, doi. 10.1093/comjnl/43.5.364
- By:
- Publication type:
- Article