Indices
This title is listed in the following:
Close
Reference Hub
This research has been cited in:
Conference
Modeling of Secure Authentication Schemes in Cloud Computing based on Hybrid Data Classification2022 IEEE Global Conference on Computing, Power and Communication Technologies (GlobConPT)10.1109/GlobConPT57482.2022.9938267 Article
BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technologyPeer-to-Peer Networking and Applications10.1007/s12083-020-00963-w Article
A secure authentication scheme for IoT application in smart homePeer-to-Peer Networking and Applications10.1007/s12083-020-00973-8 Article
Design and application of fog computing and Internet of Things service platform for smart cityFuture Generation Computer Systems10.1016/j.future.2020.06.016 Article
Reliable data dissemination for the Internet of Things using Harris hawks optimizationPeer-to-Peer Networking and Applications10.1007/s12083-020-00933-2 Article
A dynamic fog service provisioning approach for IoT applicationsInternational Journal of Communication Systems10.1002/dac.4541 Article
Conference
Trust Induced Resource Provisioning (TIRP) Mechanism in IoT2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)10.1109/ICCCSP49186.2020.9315281 Article
Efficient caching method in fog computing for internet of everythingPeer-to-Peer Networking and Applications10.1007/s12083-020-00952-z Article
Fuzzy Q-learning approach for autonomic resource provisioning of IoT applications in fog computing environmentsJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-023-04527-7 Article
5G network-oriented hierarchical distributed cloud computing system resource optimization scheduling and allocationComputer Communications10.1016/j.comcom.2020.10.005
Close Top Results From Your Most Recent Search
Close