International Journal of Pervasive Computing and Communications: Volume 20 Issue 5
Table of contents
Development of cloud selection supporting model for green information and communication technology services
Sanjiv Rao Godla, Jara Muda Haro, S.V.V.S.N. Murty Ch, R.V.V. KrishnaThe purpose of the study is to develop a cloud supporting model for green computing. In today's contemporary world, information technology (IT) plays a significant role. Because…
LMH-RPL: a load balancing and mobility aware secure hybrid routing protocol for low power lossy network
Robin Cyriac, Saleem Durai M.A.Routing protocol for low-power lossy network (RPL) being the de facto routing protocol used by low power lossy networks needs to provide adequate routing service to mobile nodes…
A secure IoT and edge computing based EV selection model in V2G systems using ant colony optimization algorithm
Gopinath Anjinappa, Divakar Bangalore PrabhakarThe fluctuations that occurred between the power requirements have shown a higher range of voltage regulations and frequency. The fluctuations are caused because of substantial…
Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
Mohan Naik R., H. Manoj T. Gadiyar, Sharath S. M., M. Bharathrajkumar, Sowmya T. K.There are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in…
ElGamal algorithm with hyperchaotic sequence to enhance security of cloud data
Aruna Kumari Koppaka, Vadlamani Naga LakshmiIn the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic world, the…
IIBES: a proposed framework to improve the identity-based encryption system for securing federated learning
Maitri Patel, Rajan Patel, Nimisha Patel, Parita Shah, Kamal GulatiIn the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates…
Federated learning algorithm based on matrix mapping for data privacy over edge computing
Pradyumna Kumar Tripathy, Anurag Shrivastava, Varsha Agarwal, Devangkumar Umakant Shah, Chandra Sekhar Reddy L., S.V. AkilandeeswariThis paper aims to provide the security and privacy for Byzantine clients from different types of attacks.
ISSN:
1742-7371e-ISSN:
1742-738XISSN-L:
1742-7371Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Seng Loke