354 results on '"Vojislav B. Misic"'
Search Results
2. Performance Assessment of Vehicular Cloud Systems: An Analytical Approach Using M/G/m Queueing Model.
3. Towards Well-trained Model Robustness in Federated Learning: An Adversarial- Example-Generation- Efficiency Perspective.
4. On Dependability of Heterogeneous Distributed Oracle System in Blockchain.
5. Performance of Ethereum 2.0-Like Consensus Under Single-Slot Finality.
6. Investigating the Impact of TXOP Allocation in IEEE 802.11bd for NGV Devices.
7. Investigating the Effect of Distance and TXOP Allocation Limit in IEEE 802.11bd Networks.
8. Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-Like Blockchains? Quantitative Analysis.
9. RSMS: Towards Reliable and Secure Metaverse Service Provision.
10. PASS: A Parameter Audit-Based Secure and Fair Federated Learning Scheme Against Free-Rider Attack.
11. PA-iMFL: Communication-Efficient Privacy Amplification Method Against Data Reconstruction Attack in Improved Multilayer Federated Learning.
12. Block and Transaction Delivery in Ethereum Network.
13. Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network.
14. Analyzing the Impact of TXOP Allocation on Legacy Devices in IEEE 802.11bd Networks.
15. Toward Decentralization in DPoS Systems: Election, Voting, and Leader Selection Using Virtual Stake.
16. An In-Depth Look at Forking-Based Attacks in Ethereum With PoW Consensus.
17. Analytical evaluation of three attacks on Ethereum.
18. SES2: A Secure and Efficient Symmetric Searchable Encryption Scheme for Structured Data.
19. Performance of IEEE 802.11bd Channel Bonding with Fallback.
20. PBFT with Gated Prioritized Block Cycles.
21. Fast Cycle Multiple Entry PBFT Consensus.
22. DIDs-Assisted Secure Cross-Metaverse Authentication Scheme for MEC-Enabled Metaverse.
23. Threat Capability of Stubborn Mining in Imperfect GHOST Bitcoin Blockchain.
24. Performance of IEEE802.11bd for Legacy and NGV Devices with Channel Bonding and No Fallback.
25. Prioritizing transaction delivery in Ethereum network.
26. Trust and Rewards in a Two-Tier Consensus Architecture.
27. Towards Lightweight and Privacy-preserving Data Provision in Digital Forensics for Driverless Taxi.
28. A2E: Attribute-based Anonymity-Enhanced Authentication for Accessing Driverless Taxi Service.
29. MBCT: A Monero-Based Covert Transmission Approach with On-chain Dynamic Session Key Negotiation.
30. Progress in Privacy Protection: A Review of Privacy Preserving Techniques in Recommender Systems, Edge Computing, and Cloud Computing.
31. Cooperative UAV Resource Allocation and Task Offloading in Hierarchical Aerial Computing Systems: A MAPPO-Based Approach.
32. A Two-Stage PBFT Architecture With Trust and Reward Incentive Mechanism.
33. Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach.
34. Design of Proof-of-Stake PBFT Algorithm for IoT Environments.
35. Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme.
36. Dual-UAV Aided Secure Dynamic G2U Communication.
37. Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting.
38. On block delivery time in Ethereum network.
39. How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach.
40. Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems.
41. Proof of Stake Voting in Multiple Entry PBFT System.
42. Efficient multi-tier, multiple entry PBFT consensus algorithm for IoT.
43. Improving Rating and Relevance with Point-of-Interest Recommender System.
44. Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain.
45. Evaluating fork after withholding (FAW) attack in Bitcoin.
46. Practical solutions in fully homomorphic encryption: a survey analyzing existing acceleration methods.
47. Reducing the number of transaction messages in bitcoin.
48. DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics.
49. Understanding MEC empowered vehicle task offloading performance in 6G networks.
50. A high performance two-layer consensus architecture for blockchain-based IoT systems.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.