default search action
Search dblp for Publications
export results for "toc:db/journals/ijipt/ijipt16.bht:"
@article{DBLP:journals/ijipt/AshokkumarKLV23, author = {N. Ashokkumar and N. S. Kavitha and M. Lakshmi and Ashok Vajravelu}, title = {A constant temperature control system for indoor environments in buildings using internet of things}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {4}, pages = {217--225}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.139352}, doi = {10.1504/IJIPT.2023.139352}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/AshokkumarKLV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/BaziB23, author = {Kaoutar Bazi and Nassereddine Bouchaib}, title = {Enhanced {TCP} {BBR} performance in wireless mesh networks (WMNs) and next-generation high-speed 5G networks}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {4}, pages = {226--239}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.139364}, doi = {10.1504/IJIPT.2023.139364}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/BaziB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/Du23, author = {Heng Du}, title = {Smart approach to constraint programming: intelligent backtracking using artificial intelligence}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {4}, pages = {185--195}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.139285}, doi = {10.1504/IJIPT.2023.139285}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/Du23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/GambhavaB23, author = {Bhavika Gambhava and C. K. Bhensdadia}, title = {Mathematical modelling of packet transmission during reclamation period in NewReno {TCP} and {CTCP}}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {2}, pages = {110--118}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.131296}, doi = {10.1504/IJIPT.2023.131296}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/GambhavaB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/GripsyK23, author = {J. Viji Gripsy and K. R. Kanchana}, title = {Relaxed hybrid routing to prevent consecutive attacks in mobile ad-hoc networks}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {2}, pages = {92--98}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.131292}, doi = {10.1504/IJIPT.2023.131292}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/GripsyK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/HamamrehAA23, author = {Rushdi A. Hamamreh and Mohammed R. Ayyad and Mohammed AbuTaha}, title = {{RAD:} reinforcement authentication model based on {DYMO} protocol for {MANET}}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {1}, pages = {46--57}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.10054906}, doi = {10.1504/IJIPT.2023.10054906}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/HamamrehAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/IqbalM23, author = {Ummer Iqbal and Ajaz Hussain Mir}, title = {Practical and scalable access control mechanism for wireless sensor networks}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {1}, pages = {11--33}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.10054904}, doi = {10.1504/IJIPT.2023.10054904}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/IqbalM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/JaiswalP23, author = {Vivek Kumar Jaiswal and Sanjeev Patel}, title = {A comparative performance analysis of {TCP} congestion control algorithm: elastic {TCP} vs. e-Elastic {TCP}}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {3}, pages = {161--175}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.133029}, doi = {10.1504/IJIPT.2023.133029}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/JaiswalP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/KangD23, author = {Hai{-}Yan Kang and Jie Deng}, title = {A cross encryption scheme for data security storage in cloud computing environment}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {1}, pages = {1--10}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.10054903}, doi = {10.1504/IJIPT.2023.10054903}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/KangD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/KangFSL23, author = {Haiyan Kang and Yaping Feng and Xiameng Si and Kaili Lu}, title = {Research on personalised privacy-preserving model of multi-sensitive attributes}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {1}, pages = {58--67}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.10054907}, doi = {10.1504/IJIPT.2023.10054907}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/KangFSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/KangLZ23, author = {Haiyan Kang and Ying Li and Shasha Zhang}, title = {An effective differential privacy protection method of location data based on perturbation loss constraint}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {4}, pages = {196--203}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.139344}, doi = {10.1504/IJIPT.2023.139344}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/KangLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/Luo23, author = {Wei Luo}, title = {Cognitive wireless communication network information sharing method based on blockchain technology}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {2}, pages = {99--109}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.131294}, doi = {10.1504/IJIPT.2023.131294}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/Luo23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/MouakherDA23, author = {In{\`{e}}s Mouakher and Fatma Dhaou and J. Christian Attiogb{\'{e}}}, title = {Validating and verifying LwM2M clients with event-B}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {2}, pages = {75--91}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.131291}, doi = {10.1504/IJIPT.2023.131291}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/MouakherDA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/NeelamS23, author = {Bhushana Samyuel Neelam and Benjamin A. Shimray}, title = {Improved network performance in {CPS} communication with distributed {IPC} mechanisms of recursive internetworking architecture {(RINA)}}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {1}, pages = {68--74}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.10045826}, doi = {10.1504/IJIPT.2023.10045826}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/NeelamS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/PatilAP23, author = {Sandeep Patil and Lalita S. Admuthe and Meenakshi R. Patil}, title = {{SNTAM:} secure neuro-fuzzy-based trusted neighbour selection and attackers detection in multipath ad-hoc network}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {2}, pages = {119--130}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.131307}, doi = {10.1504/IJIPT.2023.131307}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/PatilAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/PrasadP23, author = {Shilpee Prasad and B. R. Purushothama}, title = {Secure and verifiable outsourcing of Euclidean distance and closest pair of points with single untrusted cloud server}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {1}, pages = {34--45}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.10054905}, doi = {10.1504/IJIPT.2023.10054905}, timestamp = {Wed, 03 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/PrasadP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/PrasadSDK23, author = {S. Narasimha Prasad and K. Senthamil Selvan and B. Lakshmi Dhevi and A. Niranjil Kumar}, title = {Computation on scheduling attacks and optimal resource utilisation in wireless sensor networks via optimisation techniques}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {3}, pages = {131--137}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.133026}, doi = {10.1504/IJIPT.2023.133026}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/PrasadSDK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/VermaD23, author = {Ankit Verma and Suman Deswal}, title = {Efficient routing protocol for IoT networks based on fog computing and routing protocol of low-power lossy networks}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {3}, pages = {176--184}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.133031}, doi = {10.1504/IJIPT.2023.133031}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/VermaD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/WerapunSTT23, author = {Warodom Werapun and Jakapan Suaboot and Piyawit Tantisarkhornkhet and Jirawat Thaenthong}, title = {{SVC-MST} {BWQLB} multicast over software-defined networking}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {4}, pages = {204--216}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.139339}, doi = {10.1504/IJIPT.2023.139339}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/WerapunSTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/YuQ23, author = {Tianfang Yu and Xue{-}Song Qiu}, title = {Towards a transmission control mechanism for data centres based on flow deadline and size over software defined networking}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {3}, pages = {148--160}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.133030}, doi = {10.1504/IJIPT.2023.133030}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/YuQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipt/ZebaA23, author = {Sana Zeba and Mohammad Amjad}, title = {Distribution and tracking current live location of recognised criminal face at decentralised blockchain through image}, journal = {Int. J. Internet Protoc. Technol.}, volume = {16}, number = {3}, pages = {138--147}, year = {2023}, url = {https://doi.org/10.1504/IJIPT.2023.133028}, doi = {10.1504/IJIPT.2023.133028}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipt/ZebaA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.