Deepak Puthal
Deepak Puthal
School of Computing, Newcastle University, United Kingdom
Verified email at - Homepage
TitleCited byYear
Cloud computing features, issues, and challenges: a big picture
D Puthal, BPS Sahoo, S Mishra, S Swain
2015 International Conference on Computational Intelligence and Networks …, 2015
The blockchain as a decentralized security framework [future directions]
D Puthal, N Malik, SP Mohanty, E Kougianos, C Yang
IEEE Consumer Electronics Magazine 7 (2), 18-21, 2018
Threats to networking cloud and edge datacenters in the Internet of Things
D Puthal, S Nepal, R Ranjan, J Chen
IEEE Cloud Computing 3 (3), 64-71, 2016
Edge of things: The big picture on the integration of edge, IoT and the cloud in a distributed computing environment
H El-Sayed, S Sankar, M Prasad, D Puthal, A Gupta, M Mohanty, CT Lin
IEEE Access 6, 1706-1717, 2017
Secure and sustainable load balancing of edge data centers in fog computing
D Puthal, MS Obaidat, P Nanda, M Prasad, SP Mohanty, AY Zomaya
IEEE Communications Magazine 56 (5), 60-65, 2018
A dynamic prime number based efficient security mechanism for big sensing data streams
D Puthal, S Nepal, R Ranjan, J Chen
Journal of Computer and System Sciences 83 (1), 22-42, 2017
DPBSV--an efficient and secure scheme for big sensing data stream
D Puthal, S Nepal, R Ranjan, J Chen
2015 IEEE Trustcom/BigDataSE/ISPA 1, 246-253, 2015
Everything you wanted to know about the blockchain: Its promise, components, processes, and problems
D Puthal, N Malik, SP Mohanty, E Kougianos, G Das
IEEE Consumer Electronics Magazine 7 (4), 6-14, 2018
A dynamic key length based approach for real-time security verification of big sensing data stream
D Puthal, S Nepal, R Ranjan, J Chen
International conference on web information systems engineering, 93-108, 2015
DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream
D Puthal, S Nepal, R Ranjan, J Chen
ACM Transactions on Embedded Computing Systems (TECS) 16 (2), 51, 2017
Rendezvous based routing protocol for wireless sensor networks with mobile sink
S Sharma, D Puthal, SK Jena, AY Zomaya, R Ranjan
The journal of Supercomputing 73 (3), 1168-1188, 2017
Location of Things (LoT): A review and taxonomy of sensors localization in IoT infrastructure
RC Shit, S Sharma, D Puthal, AY Zomaya
IEEE Communications Surveys & Tutorials 20 (3), 2028-2061, 2018
Energy efficient protocols for wireless sensor networks: A survey and approach
BPS Sahoo, S Rath, D Puthal
International Journal of Computer Applications 44 (18), 43-48, 2012
Building security perimeters to protect network systems against cyber threats [future directions]
D Puthal, SP Mohanty, P Nanda, U Choppali
IEEE Consumer Electronics Magazine 6 (4), 24-27, 2017
Sustainable Service Allocation Using a Metaheuristic Technique in a Fog Server for Industrial Applications
SK Mishra, D Puthal, JJPC Rodrigues, B Sahoo, E Dutkiewicz
IEEE Transactions on Industrial Informatics 14 (10), 4497-4506, 2018
An adaptive task allocation technique for green cloud computing
SK Mishra, D Puthal, B Sahoo, SK Jena, MS Obaidat
The Journal of Supercomputing 74 (1), 370-385, 2018
SEEN: A selective encryption method to ensure confidentiality for big sensing data streams
D Puthal, X Wu, S Nepal, R Ranjan, J Chen
IEEE Transactions on Big Data, 2017
Secure Data Collection & Critical Data Transmission in Mobile Sink WSN
D Puthal, B Sahoo
LAP Lambert Academic Publishing, 2012
Building a sustainable Internet of Things: Energy-efficient routing using low-power sensors will meet the need
SS Roy, D Puthal, S Sharma, SP Mohanty, AY Zomaya
IEEE Consumer Electronics Magazine 7 (2), 42-49, 2018
Effective Machine to Machine Communications in Smart Grid Networks
D Puthal, B Sahoo, BPS Sahoo
The system can't perform the operation now. Try again later.
Articles 1–20