All Stories

  1. Wireless Powered Mobile Edge Computing Networks: A Survey
  2. A Contactless Authentication System Based on WiFi CSI
  3. A Comprehensive Review on Vision-based Violence Detection in Surveillance Videos
  4. Nondeterministic Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing
  5. The Application of the Blockchain Technology in Voting Systems
  6. Selection of Intermediate Routes for Secure Data Communication Systems using Graph Theory Application and Grey Wolf Optimization Algorithm in MANETs
  7. A Scalable and Efficient Authentication Scheme for Secure Smart Grid Communication
  8. Gateway-oriented two-server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing
  9. A Comparative analysis of IoT based products, technology and integration of IoT with cloud computing
  10. ElGamal Cryptosystem-based Secure Authentication System for Cloud-based IoT Applications
  11. An efficient online/offline IBSS protocol using PDL for WSNs
  12. Smart mobility management in 5G Heterogeneous Networks
  13. Towards an Incentive-Compatible, Reputation-based Framework for Stimulating Cooperation in Opportunistic Networks: A Survey