Search
for Author
All Reviews
Kumar, Neeraj
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
Date Reviewed
1
-
2
of
2
reviews
Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing
Diro A., Chilamkurti N., Kumar N. Mobile Networks and Applications 22(5): 848-858, 2017. Type: Article
Diro et al. “propose novel lightweight security solutions for publish-subscribe protocol-based Internet of Things [IoT] in fog networks using [elliptic curve cryptography, ECC].” This proposal would be of interest t...
...
Nov 29 2017
An intelligent context-aware congestion resolution protocol for data dissemination in vehicular ad hoc networks
Dua A., Kumar N., Bawa S., Rodrigues J. Mobile Networks and Applications 20(2): 181-200, 2015. Type: Article
A new context-aware congestion resolution protocol, minimum calculated desired time (MCDT), for intelligent data dissemination in vehicular ad hoc networks (VANETs) is proposed in this paper. In this scheme, the link stability is compu...
...
Nov 10 2015
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy