85 results on '"Rai, Mritunjay Kumar"'
Search Results
2. Current Issues and Challenges of Security in IoT Based Applications
3. Decentralized accessibility of e-commerce products through blockchain technology
4. Blockchain Powered Secure Range-Free Localization in Wireless Sensor Networks
5. An Advanced DV-Hop Localization Algorithm for Random Mobile Nodes in Wireless Sensor Networks
6. Current Issues and Challenges of Security in IoT Based Applications
7. CROP: Cognitive radio ROuting Protocol for link quality channel diverse cognitive networks
8. Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks
9. An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs
10. Identifying P2P traffic: A survey
11. Cognitive radio intelligent-MAC (CR-i-MAC): channel-diverse contention free approach for spectrum management
12. Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things
13. Cooperative Sensing for Cognitive Radio: A Powerful Access Method for Shadowing Environment
14. Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks
15. A Lattice Signcrypted Secured Localization in Wireless Sensor Networks
16. A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface
17. A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption
18. Improved DV-Hop Localization Scheme for Randomly Deployed WSNs
19. CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure
20. A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect
21. The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface.
22. Recent Developments in Cloud Computing Environment: Current Challenges and Future Prospects
23. Recent Advances in DV-hop Localization Algorithm for Wireless Sensor Networks
24. Energy Efficient Range-Free Localization Algorithm for Wireless Sensor Networks
25. Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics
26. A Structured Review on Security and Energy Efficient Protocols for Wireless Sensor Networks
27. Analyzing the Tradeoff Between Planning and Execution of Robotics Process Automation Implementation in it Sector
28. Privacy Ensured ${e}$ -Healthcare for Fog-Enhanced IoT Based Applications
29. Adaptive Classifier based Intrusion Detection System using Logistic Regression and Euclidean Distance on Network Probe Vectors in Resource Constrained Networks
30. A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks
31. A Review on Abnormal Activity Detection Methods
32. An Adaptive Parallel Interference Mitigation Technique using Artificial Neural Network in Complementary Coded MC-CDMA
33. A Security Provisioned Blockchain Architecture for Multi-Purpose Health Information
34. Advanced Multiresolution Wavelet Based Wideband Spectrum Sensing Technique for Cognitive Radio
35. A Comparative Study on Various LPWAN and Cellular Communication Technologies for IoT Based Smart Applications
36. Resource Sharing Technique for Device to Device Link in License Band LTE-A
37. An Approach for Location Verification using Atomic Localization in Wireless Sensor Networks
38. An Investigational Analysis of DSDV, AODV and DSR Routing Protocols in Mobile Ad Hoc Networks
39. An Illustration of Making a Home Automation System Using Raspberry Pi and PIR Sensor
40. Simulative Analysis of Local Area Network Using WiMAX
41. Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN
42. Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication
43. An improved DV-Hop localization with minimum connected dominating set for mobile nodes in wireless sensor networks
44. Comparative Analysis of Various Techniques for Detection and Mitigation of Wormhole Attack in MANET
45. Chaotic Image Encryption Technique based on IDEA and Discrete Wavelet Transformation
46. Design of Distributed Approach for Wormhole Attack Detection in Wireless Sensor Networks
47. Cognitive Radio Spectrum Sensing Technique Using M-ary QAM for Different Fading Environments
48. A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks
49. SIMULATIVE INTERFERENCE ANALYSIS FOR COGNITIVE RADIO USING HATA PROPAGATION MODEL IN DIFFERENT NON-TIME DISPERSIVE RADIO ENVIRONMENT
50. Identifying P2P traffic: A survey
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.