


default search action
International Journal of Internet Protocol Technology, Volume 16
Volume 16, Number 1, 2023
- Hai-Yan Kang, Jie Deng:
A cross encryption scheme for data security storage in cloud computing environment. 1-10 - Ummer Iqbal, Ajaz Hussain Mir:
Practical and scalable access control mechanism for wireless sensor networks. 11-33 - Shilpee Prasad, B. R. Purushothama:
Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server. 34-45 - Rushdi A. Hamamreh, Mohammed R. Ayyad, Mohammed AbuTaha:
RAD: reinforcement authentication model based on DYMO protocol for MANET. 46-57 - Haiyan Kang, Yaping Feng, Xiameng Si, Kaili Lu:
Research on personalised privacy-preserving model of multi-sensitive attributes. 58-67 - Bhushana Samyuel Neelam, Benjamin A. Shimray:
Improved network performance in CPS communication with distributed IPC mechanisms of recursive internetworking architecture (RINA). 68-74
Volume 16, Number 2, 2023
- Inès Mouakher, Fatma Dhaou
, J. Christian Attiogbé:
Validating and verifying LwM2M clients with event-B. 75-91 - J. Viji Gripsy
, K. R. Kanchana:
Relaxed hybrid routing to prevent consecutive attacks in mobile ad-hoc networks. 92-98 - Wei Luo:
Cognitive wireless communication network information sharing method based on blockchain technology. 99-109 - Bhavika Gambhava, C. K. Bhensdadia:
Mathematical modelling of packet transmission during reclamation period in NewReno TCP and CTCP. 110-118 - Sandeep Patil
, Lalita S. Admuthe, Meenakshi R. Patil
:
SNTAM: secure neuro-fuzzy-based trusted neighbour selection and attackers detection in multipath ad-hoc network. 119-130
Volume 16, Number 3, 2023
- S. Narasimha Prasad, K. Senthamil Selvan, B. Lakshmi Dhevi, A. Niranjil Kumar:
Computation on scheduling attacks and optimal resource utilisation in wireless sensor networks via optimisation techniques. 131-137 - Sana Zeba, Mohammad Amjad:
Distribution and tracking current live location of recognised criminal face at decentralised blockchain through image. 138-147 - Tianfang Yu, Xue-Song Qiu:
Towards a transmission control mechanism for data centres based on flow deadline and size over software defined networking. 148-160 - Vivek Kumar Jaiswal, Sanjeev Patel:
A comparative performance analysis of TCP congestion control algorithm: elastic TCP vs. e-Elastic TCP. 161-175 - Ankit Verma, Suman Deswal:
Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks. 176-184
Volume 16, Number 4, 2023
- Heng Du:
Smart approach to constraint programming: intelligent backtracking using artificial intelligence. 185-195 - Haiyan Kang, Ying Li, Shasha Zhang:
An effective differential privacy protection method of location data based on perturbation loss constraint. 196-203 - Warodom Werapun, Jakapan Suaboot, Piyawit Tantisarkhornkhet, Jirawat Thaenthong:
SVC-MST BWQLB multicast over software-defined networking. 204-216 - N. Ashokkumar, N. S. Kavitha
, M. Lakshmi, Ashok Vajravelu:
A constant temperature control system for indoor environments in buildings using internet of things. 217-225 - Kaoutar Bazi, Bouchaib Nassereddine:
Enhanced TCP BBR performance in wireless mesh networks (WMNs) and next-generation high-speed 5G networks. 226-239

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.