All Stories

  1. An All-Inclusive Taxonomy and Critical Review of Blockchain-Assisted Authentication and Session Key Generation Protocols for IoT
  2. Workflow scheduling in distributed systems under fuzzy environment
  3. A Fuzzy Logic Approach to Repair Coverage Holes in IoT Monitoring Applications
  4. Policy-based SQLIA detection and prevention approach for RFID systems
  5. A Data Fusion Method in Wireless Sensor Networks
  6. Rees semigroups of digraphs for classification of data
  7. Guest Editorial
  8. Using response action with intelligent intrusion detection and prevention system against web application malware
  9. Service Level Agreements for the Digital Library
  10. Scalable RFID security framework and protocol supporting Internet of Things
  11. Corrigendum to Analysis of Insiders Attack Mitigation Strategies
  12. Analysis of Insiders Attack Mitigation Strategies
  13. An efficient meta-heuristic algorithm for grid computing
  14. Performance analysis of two-hop decode-amplify-forward relayed system in different fading conditions
  15. SQLIA detection and prevention approach for RFID systems
  16. Classification systems based on combinatorial semigroups
  17. Guest Editorial
  18. Internet and Distributed Computing Advancements
  19. Computer Applications for Modeling, Simulation, and Automobile
  20. Negotiation Strategy for Mobile Agent-Based e-Negotiation
  21. An Approach for Removing Redundant Data from RFID Data Streams
  22. SMS-Based Medical Diagnostic Telemetry Data Transmission Protocol for Medical Sensors
  23. QoS-based adaptation service selection broker
  24. Guest Editorial
  25. Privacy Threat Analysis of Social Network Data
  26. Securing RFID Systems from SQLIA
  27. A Protocol for Discovering Content Adaptation Services
  28. Hybrid Feature Selection for Phishing Email Detection
  29. Engaging and Effective Asynchronous Online Discussion Forums
  30. Quality Control of Sensor Network Data
  31. Performance Analysis of Receive Diversity in Wireless Sensor Networks over GBSBE Models
  32. A rough set approach for selecting clustering attribute
  33. Pervasive Computing
  34. An Approach to Filtering Duplicate RFID Data Streams
  35. A Privacy Preserving Service Broker Architecture for Data Sharing
  36. Advances in pervasive computing
  37. Human‐computer interaction in ubiquitous computing environments
  38. An efficient adaptive scheduling policy for high-performance computing
  39. Determining Service Trustworthiness in Intercloud Computing Environments
  40. Enhancing RFID Tag Resistance against Cloning Attack
  41. Agents Based e-Commerce and Securing Exchanged Information
  42. An Online Credential Management Service for InterGrid Computing
  43. Investigation of Stakeholders Commitment to Information Security Awareness Programs
  44. Security and privacy threats to volunteer computing
  45. An Authentication Framework for e-Health Systems
  46. Secure Mobile Agent-based E-Negotiation for On-Line Trading
  47. Sensor Node Activity Scheduling Approach
  48. Feedback Credibility Issues In Trust Management Systems
  49. Multi-Cluster Computing Interconnection Network Performance Modeling and Analysis
  50. Special section: Parallel input/output management techniques (PIOMT) in cluster and grid computing
  51. Adaptive parallel I/O scheduling algorithm for multiprogrammed systems
  52. Grid Accounting Service Infrastructure for Service-Oriented Grid Computing Systems
  53. Parallel job scheduling on multicluster computing system
  54. Orphan problems and remedies in distributed systems
  55. Guest Editorial
  56. Securing a Smart Anti-counterfeit Web Application
  57. Mobile Agents Security Protocols
  58. Formal model for verifying compatibility among transactions
  59. Fault-tolerant scheduling policy for grid computing systems
  60. An integrated resource scheduling approach on cluster computing systems