default search action
Peer-to-Peer Networking and Applications, Volume 13
Volume 13, Number 1, January 2020
- Libo Jiao, Hao Yin, Dongchao Guo, Haojun Huang, Qin Gao:
Resource allocation in two-tier small-cell networks with energy consumption constraints. 1-15 - Cong Zhang, Hsin-Hung Cho, Chi-Yuan Chen:
Emergency-level-based healthcare information offloading over fog network. 16-26 - Luis Rodrigues, Joel Guerreiro, Noélia Correia:
RELOAD/CoAP architecture for the federation of wireless sensor networks. 27-37 - Fei Gu, Jianwei Niu, Xin Jin, Shui Yu:
FDFA: A fog computing assisted distributed analytics and detecting system for family activities. 38-52 - Hong Wang, Jianhua Li, Chengzhe Lai, Zhe Wang:
A provably secure aggregate authentication scheme for unmanned aerial vehicle cluster networks. 53-63 - Weimin Li, Bin Wang, Jinfang Sheng, Xiangyu Hou, Lin Chen, Jiaguang Liu:
A software defined caching framework based on user access behavior analysis for transparent computing server. 64-81 - R. Madhusudhan, Shashidhara:
Mobile user authentication protocol with privacy preserving for roaming service in GLOMONET. 82-103 - Dadmehr Rahbari, Mohsen Nickray:
Task offloading in mobile fog computing by classification and regression tree. 104-122 - Jie Wang, Fei Dai, Jie Yang, Guan Gui:
Efficient combination policies for diffusion adaptive networks. 123-136 - Michal Boron, Jerzy Brzezinski, Anna Kobusinska:
P2P matchmaking solution for online games. 137-150 - Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Performance Modeling of Linux Network System with Open vSwitch. 151-162 - Ata Ullah, Ghawar Said, Muhammad Sher, Huansheng Ning:
Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN. 163-174 - Xianfu Meng, Ge Zhang:
TrueTrust: a feedback-based trust management model without filtering feedbacks in P2P networks. 175-189 - Shilpa Budhkar, Venkatesh Tamarapalli:
An overlay management strategy to improve QoS in CDN-P2P live streaming systems. 190-206 - Maryam Zarezadeh, Hamid Mala, Maede Ashouri-Talouki:
Multi-keyword ranked searchable encryption scheme with access control for cloud storage. 207-218 - Muhammad Salman Raheel, Raad Raad:
Energy efficient technique for P2P multisource video streaming in mobile ad hoc networks to improve QoE. 219-242 - Masahiro Sasabe:
Topological influence on optimality of Tit-for-Tat based P2P content distribution. 243-254 - Jian Wu, Zhigang Chen, Jia Wu, Xiao Liu, Genghua Yu, Yedong Zhao:
An energy efficient data transmission approach for low-duty-cycle wireless sensor networks. 255-268 - Peng Zheng, Hongxiao Fei, Yeqing Yan:
An effective positive transmission routing algorithm based on social relationships in opportunistic social networks. 269-286 - Dongchao Ma, Guangxing Han, Hongchao Li, Li Ma, Chengan Zhao:
A parallel optimization for energy and robustness of file distribution services. 287-303 - B. Guru Prakash, C. Balasubramanian, R. Sukumar:
An approach by adopting multi-objective clustering and data collection along with node sleep scheduling for energy efficient and delay aware WSN. 304-319 - Amr Elsaadany, Khalid Khalil:
Assessment of coverage quality of sensor networks for IoT applications. 320-332 - Monali Mavani, Krishna Asawa:
Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses. 333-347 - Gaurav Srivastava, Richa Agrawal, Kunwar Singh, Rajeev Tripathi, Kshirasagar Naik:
A hierarchical identity-based security for delay tolerant networks using lattice-based cryptography. 348-367 - Xiaogang Qi, Min Qiang, Lifang Liu:
A balanced strategy to improve data invulnerability in structured P2P system. 368-387 - Sneha Kanchan, Garima Singh, Narendra S. Chaudhari:
EASPSC: Efficient authentication of SignRecryption protocol using shareable clouds in VANET groups. 388-411 - Hassan Mahdikhani, Rasoul Shahsavarifar, Rongxing Lu, David Bremner:
Achieve privacy-preserving simplicial depth query over collaborative cloud servers. 412-423
Volume 13, Number 2, March 2020
- Editor's note: Special issue on internet of things system technologies based on quality of experience. 425
- Cheng-Ta Huang:
A scheme of flexible and reversible information-hiding in SMVQ mechanism. 426-438 - Fatma Merabet, Amina Cherif, Malika Belkadi, Olivier Blazy, Emmanuel Conchon, Damien Sauveron:
New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications. 439-474 - Dongsik Son, Seungpyo Huh, Taejin Lee, Jin Kwak:
Internet of things system technologies based on quality of experience. 475-488 - Hangi Kim, Myungseo Park, Jaehyung Cho, Jihun Kim, Jongsung Kim:
Weaknesses of some lightweight blockciphers suitable for IoT systems and their applications in hash modes. 489-513 - Chi-Yao Weng:
DWT-based reversible information hiding scheme using prediction-error-expansion in multimedia images. 514-523 - Jun Woo Kim, Soo Kyun Kim:
Interactive job sequencing system for small make-to-order manufacturers under smart manufacturing environment. 524-531 - Masood Ahmad, Ataul Aziz Ikram, Ishtiaq Wahid, Fasee Ullah, Awais Ahmad, Fakhri Alam Khan:
Optimized clustering in vehicular ad hoc networks based on honey bee and genetic algorithm for internet of things. 532-547 - Huaiying Sun, Huiqun Yu, Guisheng Fan, Liqiong Chen:
Energy and time efficient task offloading and resource allocation on the generic IoT-fog-cloud architecture. 548-563 - Serim Kang, Soram Kim, Jongsung Kim:
Forensic analysis for IoT fitness trackers and its application. 564-573 - Editor's Note: Special issue on P2P Computing for Intelligence of Things. 574
- Sunmoon Jo, Jieun Lee, Jungsoo Han, Supratip Ghose:
P2P computing for intelligence of things. 575-578 - Sunghyuck Hong:
P2P networking based internet of things (IoT) sensor node authentication by Blockchain. 579-589 - N. Noor Alleema, D. Siva Kumar:
Volunteer nodes of ant colony optimization routing for minimizing delay in peer to peer MANETs. 590-600 - Dae-Young Kim, Ahyoung Lee, Seokhoon Kim:
P2P computing for trusted networking of personalized IoT services. 601-609 - Kyungyong Chung, Roy C. Park:
P2P-based open health cloud for medicine management. 610-622 - Doohee Han, Myeongyun Cho:
Selective switching dual-transmission scheme in multi-LED Hybrid VLC-P2P networking system. 623-634 - Jungpil Shin, Md. Rashedul Islam, Md. Abdur Rahim, Hyung-Jin Mun:
Arm movement activity based user authentication in P2P systems. 635-646 - P. Uma Maheswari, T. R. Ganeshbabu:
Repetitive node categorization technique based reliable clustering and energy efficient communication in P2P wireless sensor network. 647-658 - Yong-Young Kim, Yong-Ki Kim, Dae-Sik Kim, Mi-Hye Kim:
Implementation of hybrid P2P networking distributed web crawler using AWS for smart work news big data. 659-670 - YongJoo Lee, Keon Myung Lee, Sang Ho Lee:
Blockchain-based reputation management for custom manufacturing service in the peer-to-peer networking environment. 671-683 - Sun Park, ByungRea Cha, Kyungyong Chung, JongWon Kim:
Mobile IoT device summarizer using P2P web search engine and inherent characteristic of contents. 684-693 - Kyungyong Chung, Hyun Yoo:
Edge computing health model using P2P-based deep neural networks. 694-703 - Manh Tien, Yoon Young Park, Kang-Hee Jung, Se-Yeob Kim, Joong-Eup Kye:
Performance evaluation on the accuracy of the semantic map of an autonomous robot equipped with P2P communication module. 704-716 - B. Priya, T. Gnanasekaran:
To optimize load of hybrid P2P cloud data-center using efficient load optimization and resource minimization algorithm. 717-728
Volume 13, Number 3, May 2020
- Songai Xuan, DoHyeun Kim:
Development of Cloud of Things Based on Proxy Using OCF IoTivity and MQTT for P2P Internetworking. 729-741 - Pavan Kumar C., Selvakumar R.:
Reliable and secure data communication in wireless sensor networks using optimal locally recoverable codes. 742-751 - C. Umarani, S. Kannan:
Intrusion detection system using hybrid tissue growing algorithm for wireless sensor network. 752-761 - Garima Singh, Deepti D. Shrimankar:
Secure & efficient intra-MME handovers via mobile relays within the LTE-A and future 5G high-speed train networks. 762-779 - Hassan Harb, Chady Abou Jaoude, Abdallah Makhoul:
An energy-efficient data prediction and processing approach for the internet of things and sensing based applications. 780-795 - Walid Osamy, Ahmed El-Sawy, Ahmed M. Khedr:
Effective TDMA scheduling for tree-based data collection using genetic algorithm in wireless sensor networks. 796-815 - Seyed Farhad Aghili, Hamid Mala:
Tracking and impersonating tags in a CRC-based ultralightweight RFID authentication protocol. 816-824 - Elahe Khatibi, Mohsen Sharifi, Seyedeh Leili Mirtaheri:
DPAS: A dynamic popularity-aware search mechanism for unstructured P2P systems. 825-849 - Nadine Boudargham, Jacques Bou Abdo, Jacques Demerjian, Christophe Guyeux, Abdallah Makhoul:
Performance of low level protocols in high traffic wireless body sensor networks. 850-871 - Saeed Saeedvand, Hadi S. Aghdasi, Leili Mohammad Khanli:
Novel Distributed Dynamic Backbone-based Flooding in Unstructured Networks. 872-889 - Ganesan Sangeetha, Muthuswamy Vijayalakshmi, Sannasi Ganapathy, Arputharaj Kannan:
An improved congestion-aware routing mechanism in sensor networks using fuzzy rule sets. 890-904 - Ashika R. Naik, Bettahally N. Keshavamurthy:
Next level peer-to-peer overlay networks under high churns: a survey. 905-931 - UmaMaheswari Gurusamy, K. Hariharan, M. S. K. Manikandan:
Path optimization of box-covering based routing to minimize average packet delay in software defined network. 932-939 - Jia Wu, Zhigang Chen, Ming Zhao:
Community recombination and duplication node traverse algorithm in opportunistic social networks. 940-947 - Naserali Noorani, Seyed-Amin Hosseini-Seno:
SDN- and fog computing-based switchable routing using path stability estimation for vehicular ad hoc networks. 948-964 - A. Samson Arun Raj, Yogesh Palanichamy:
An aerial intelligent relay-road side unit (AIR-RSU) framework for modern intelligent transportation system. 965-986 - Ayyasamy Ayyanar, Eanoch Golden Julie, Yesudhas Harold Robinson, Subramanian Balaji, Raghvendra Kumar, Le Hoang Son, Pham Huy Thong, Ishaani Priyadarshini:
AVRM: adaptive void recovery mechanism to reduce void nodes in wireless sensor networks. 987-1001 - Peng Hu, Yongli Wang, Bei Gong, Yongjian Wang, Yanchao Li, Ruxin Zhao, Hao Li, Bo Li:
A secure and lightweight privacy-preserving data aggregation scheme for internet of vehicles. 1002-1013 - Lili Jiang, Xiaolin Chang, Yuhang Liu, Jelena V. Misic, Vojislav B. Misic:
Performance analysis of Hyperledger Fabric platform: A hierarchical model approach. 1014-1025 - Wenjing Hou, Yixin Jiang, WenXin Lei, Aidong Xu, Hong Wen, Songling Chen:
A P2P network based edge computing smart grid model for efficient resources coordination. 1026-1037 - Sandosh S., Govindasamy V., Akila G.:
Enhanced intrusion detection system via agent clustering and classification based on outlier detection. 1038-1045 - Maha S. Abdelhaq, Raed A. Alsaqour, Abeer Algarni, Maali Alabdulhafith, Mahmoud A. Alawi, Aqeel Taha, Baraa T. Sharef, Mustafa Tariq:
Human immune-based model for intrusion detection in mobile ad hoc networks. 1046-1068 - Jia Xu, Wei Lu, Lijie Xu, Dejun Yang, Tao Li:
Correction to: Incentive mechanisms for mobile crowd sensing based on supply-demand relationship. 1069 - Chunguang Zhang, Guangping Zeng, Hongbo Wang, Xuyan Tu:
Correction to: Hierarchical resource scheduling method using improved cuckoo search algorithm for internet of things. 1070
Volume 13, Number 4, July 2020
- S. Famila, A. Jawahar, Sariga Arjunan, K. Shankar:
Improved artificial bee colony optimization based clustering algorithm for SMART sensor environments. 1071-1079 - (Withdrawn) Delay sensitive aware distributed data fault recognition algorithm for distributed sensor networks. 1080-1090
- (Withdrawn) Improved multi objective data transmission using conventional route selection algorithm in mobile ad hoc network. 1091-1101
- P. K. Poonguzhali, N. P. Ananthamoorthy:
Improved energy efficient WSN using ACO based HSA for optimal cluster head selection. 1102-1108 - A. Arokiaraj Jovith, S. V. Kasmir Raja, A. Razia Sulthana:
Interference mitigation and optimal hop distance measurement in distributed homogenous nodes over wireless sensor network. 1109-1119 - (Withdrawn) Data transmission and real-time information acquisition based on fine-grained algorithm and wireless network. 1120-1130
- Lithungo Murry, Rajagopal Kumar, Themrichon Tuithung, P. Mohamed Shakeel:
A local decision making technique for reliable service discovery using D2D communications in disaster recovery networks. 1131-1141 - Brindha Palanisamy, Senthilkumar Athappan:
Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks. 1142-1151 - Sivadi Balakrishna, M. Thirumaran, R. Padmanaban, Vijender Kumar Solanki:
An efficient incremental clustering based improved K-Medoids for IoT multivariate data cluster analysis. 1152-1175 - Mingchuan Zhang, Xin Wang, Tingting Liu, Junlong Zhu, Qingtao Wu:
AFSndn: A novel adaptive forwarding strategy in named data networking based on Q-learning. 1176-1184 - Nagendranath M. V. S. S, A. Ramesh Babu:
An efficient mobility aware stable and secure clustering protocol for mobile ADHOC networks. 1185-1192 - Sulin Pang, Junkun Yang:
Social reputation loss model and application to lost-linking borrowers in a internet financial platform. 1193-1203 - V. Rama Krishna, R. Subhashini:
Mimicking attack by botnet and detection at gateway. 1204-1214 - Fengzhen Jiang, Jie Zhang, Xu Zhao:
Research on the influence mechanism of resettlers participation in migrant work in the context of relationship network. 1215-1224 - Rui Hou, Huan Liu, Yang Hu, YunHao Zhao:
Research on secure transmission and storage of energy IoT information based on Blockchain. 1225-1235 - Lin Chang, Songhao Piao, Xiaokun Leng, Yunqiang Hu, Wende Ke:
Study on falling backward of humanoid robot based on dynamic multi objective optimization. 1236-1247 - S. Suseela, Eswari Rajagopal, S. Nickolas, M. Saravanan:
QoS optimization through PBMR algorithm in multipath wireless multimedia sensor networks. 1248-1259 - Sheng Jin, Yu Gao, Liang Chen:
Improved Deep Distance Learning for Visual Loop Closure Detection in Smart City. 1260-1271 - Ping Xie, Jianghui Liu, Gaoyuan Zhang, Ling Xing, Honghai Wu:
Opportunistic TPSR cooperative spectrum sharing protocol with secondary user selection for 5G wireless network. 1272-1283 - Haibo Liang, Xin Qin, Jianchong Gao, Muhammad Junaid Khan:
Research on detector signal receiving network layout optimization model. 1284-1296
Volume 13, Number 5, September 2020
- Maryam Zare, Seyed Hossein Khasteh, Saeid Ghafouri:
Automatic ICA detection in online social networks with PageRank. 1297-1311 - Baowen Xie, Guosheng Zhao, Mianxing Chao, Jian Wang:
A prediction model of cloud security situation based on evolutionary functional network. 1312-1326 - Zhixin Liu, Xiaopin Li, Yazhou Yuan, Xinping Guan:
Power control of D2D communication based on quality of service assurance under imperfect channel information. 1327-1339 - SungJin Yu, KiSung Park, YoHan Park, HyungPyo Kim, YoungHo Park:
A lightweight three-factor authentication protocol for digital rights management system. 1340-1356 - Samayveer Singh:
An energy aware clustering and data gathering technique based on nature inspired optimization in WSNs. 1357-1374 - Ankita Srivastava, Arun Prakash, Rajeev Tripathi:
An adaptive intersection selection mechanism using ant Colony optimization for efficient data dissemination in urban VANET. 1375-1393 - Ilker Ünal:
Integration of ZigBee based GPS receiver to CAN network for precision farming applications. 1394-1405 - Ahmad Karami, Nahideh Derakhshanfard:
RPRTD: Routing protocol based on remaining time to encounter nodes with destination node in delay tolerant network using artificial neural network. 1406-1422 - Amir Hassani Karbasi, Siyamak Shahpasand:
A post-quantum end-to-end encryption over smart contract-based blockchain for defeating man-in-the-middle and interception attacks. 1423-1441 - Yunhai Guo, Rui Lv, Zhengxiang Li:
A realized on-demand cross-layer connection strategy for wireless self-organization link based on WLAN. 1442-1456 - Rui Wang, Faezeh Hajiaghajani, Subir Biswas:
Device-to-device streaming video caching for cellular download cost reduction. 1457-1473 - Zibin Ren, Ting Lu, Xin Wang, Wenjing Guo, Guohua Liu, Shan Chang:
Resource scheduling for delay-sensitive application in three-layer fog-to-cloud architecture. 1474-1485 - Yuqi Fan, JingLin Zou, Siyu Liu, Qiran Yin, Xin Guan, Xiaohui Yuan, Weili Wu, Ding-Zhu Du:
A blockchain-based data storage framework: A rotating multiple random masters and error-correcting approach. 1486-1504 - Henry Nunoo-Mensah, Kwame Osei Boateng, James Dzisi Gadze:
PSTRM: Privacy-aware sociopsychological trust and reputation model for wireless sensor networks. 1505-1525 - Farooque Hassan Kumbhar, Navrati Saxena, Abhishek Roy:
Social Reliable D2D Relay for Trustworthy Paradigm in 5G Wireless Networks. 1526-1538 - Zainab Hassan Ali, Mahmoud Mohammed Badawy, Hesham A. Ali:
A novel geographically distributed architecture based on fog technology for improving Vehicular Ad hoc Network (VANET) performance. 1539-1566 - Jiale Wu, Mi Wen, Rongxing Lu, Beibei Li, Jinguo Li:
Toward efficient and effective bullying detection in online social network. 1567-1576 - Micael Pedrosa, André Zúquete, Carlos Costa:
RAIAP: renewable authentication on isolated anonymous profiles. 1577-1599 - Shibin Wang, Kele Mao, Furui Zhan, Dong Liu:
Hybrid conditional privacy-preserving authentication scheme for VANETs. 1600-1615 - Mahdi Tahavori, Farokhlagha Moazami:
Lightweight and secure PUF-based authenticated key agreement scheme for smart grid. 1616-1628