| A survey on privacy protection in blockchain system |
63 |
| BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0 |
56 |
| Blockchain's adoption in IoT: The challenges, and a way forward |
54 |
| An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks |
48 |
| Blockchain in healthcare applications: Research challenges and opportunities |
42 |
| An IoT-Oriented data placement method with privacy preservation in cloud environment |
40 |
| Distributed data stream processing and edge computing: A survey on resource elasticity and future directions |
38 |
| A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments |
38 |
| Community detection in networks: A multidisciplinary review |
36 |
| PEA: Parallel electrocardiogram-based authentication for smart healthcare systems |
35 |
| Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks |
35 |
| Blockchain for smart communities: Applications, challenges and opportunities |
34 |
| Multi-classification approaches for classifying mobile app traffic |
33 |
| Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning |
29 |
| A survey on FinTech |
29 |
| Internet of Things (IoT), mobile cloud, cloudlet, mobile IoT, IoT cloud, fog, mobile edge, and edge emerging computing paradigms: Disambiguation and research directions |
27 |
| Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes |
27 |
| APPA: An anonymous and privacy preserving data aggregation scheme for fog-enhanced IoT |
26 |
| Multimedia big data computing and Internet of Things applications: A taxonomy and process model |
25 |
| Influence analysis in social networks: A survey |
24 |
| Blockchain-based publicly verifiable data deletion scheme for cloud storage |
23 |
| A systematic literature review on QoS-aware service composition and selection in cloud environment |
23 |
| A survey on software defined networking with multiple controllers |
23 |
| The role of Information and Communication Technologies in healthcare: taxonomies, perspectives, and challenges |
21 |
| Efficient DDoS attacks mitigation for stateful forwarding in Internet of Things |
21 |
| Coupling resource management based on fog computing in smart city systems |
20 |
| A holistic review of Network Anomaly Detection Systems: A comprehensive survey |
20 |
| Service composition approaches in IoT: A systematic review |
20 |
| A novel efficient MAKA protocol with desynchronization for anonymous roaming service in Global Mobility Networks |
19 |
| Cryptographic primitives in blockchains |
19 |
| BlockSecIoTNet: Blockchain-based decentralized security architecture for IoT network |
18 |
| Fog data analytics: A taxonomy and process model |
18 |
| Multi-objective scheduling for scientific workflow in multicloud environment |
17 |
| An efficient symbiotic organisms search algorithm with chaotic optimization strategy for multi-objective task scheduling problems in cloud computing environment |
17 |
| Edge computing for Internet of Things: A survey, e-healthcare case study and future direction |
17 |
| D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events |
16 |
| A comprehensive survey for scheduling techniques in cloud computing |
16 |
| Multi-authority fine-grained access control with accountability and its application in cloud |
16 |
| An autonomous resource provisioning framework for massively multiplayer online games in cloud environment |
15 |
| OF-EC: A novel energy consumption aware objective function for RPL based on fuzzy logic |
15 |
| Multi-objective optimization technique for resource allocation and task scheduling in vehicular cloud architecture: A hybrid adaptive nature inspired approach |
15 |
| Performance evaluation of IoT middleware |
14 |
| DDSE: A novel evolutionary algorithm based on degree-descending search strategy for influence maximization in social networks |
14 |
| Optimization of live virtual machine migration in cloud computing: A survey and future directions |
14 |
| Cluster-based routing protocols in wireless sensor networks: A survey based on methodology |
14 |
| Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice |
14 |
| An efficient scheduling scheme for mobile charger in on-demand wireless rechargeable sensor networks |
14 |
| Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures |
13 |
| Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges |
13 |
| Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing |
13 |