Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Kumar, Neeraj Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 2 of 2 reviews    
  Lightweight cybersecurity schemes using elliptic curve cryptography in publish-subscribe fog computing
Diro A., Chilamkurti N., Kumar N. Mobile Networks and Applications 22(5): 848-858, 2017.  Type: Article

Diro et al. “propose novel lightweight security solutions for publish-subscribe protocol-based Internet of Things [IoT] in fog networks using [elliptic curve cryptography, ECC].” This proposal would be of interest t...
...
Nov 29 2017  
  An intelligent context-aware congestion resolution protocol for data dissemination in vehicular ad hoc networks
Dua A., Kumar N., Bawa S., Rodrigues J. Mobile Networks and Applications 20(2): 181-200, 2015.  Type: Article

A new context-aware congestion resolution protocol, minimum calculated desired time (MCDT), for intelligent data dissemination in vehicular ad hoc networks (VANETs) is proposed in this paper. In this scheme, the link stability is compu...
...
Nov 10 2015  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy