


Остановите войну!
for scientists:


default search action
Peer-to-Peer Networking and Applications, Volume 14
Volume 14, Number 1, January 2021
- Abdennour Zekri
, Weijia Jia:
Performance evaluation of rate adaptation algorithms for seamless heterogeneous vehicular communications. 1-17 - Hardik Dhingra, Gagan Deep Dhand, Rashmi Chawla, Shailender Gupta:
An integrated service model to support user specific QoS routing in cognitive radio ad hoc network. 18-29 - S. Balamurugan
, Ayyasamy Ayyanar, K. Suresh Joseph:
Enhanced petri nets for traceability of food management using internet of things. 30-43 - Saunhita Sapre
, S. Mini:
A differential moth flame optimization algorithm for mobile sink trajectory. 44-57 - Yuvaraj N
, Saravanan G:
Markov transition and smart cache congestion control for IoT enabled wireless mesh networks. 58-68 - Xiaoying Shen, Licheng Wang, Qingqi Pei, Yuan Liu, Miaomiao Li:
Location privacy-preserving in online taxi-hailing services. 69-81 - Vinod Kumar
, Rajendra Kumar
, Santosh K. Pandey:
LKM-AMI: A Lightweight Key Management Scheme for Secure two Way Communications between Smart Meters and HAN Devices of AMI System in Smart Grid. 82-100 - Vinod Kumar, Rajendra Kumar
, Santosh K. Pandey:
Correction to: LKM-AMI: A Lightweight Key Management Scheme for Secure two Way Communications between Smart Meters and HAN Devices of AMI System in Smart Grid. 101 - Praveen Kumar Premkamal
, Syam Kumar Pasupuleti
, Abhishek Kumar Singh
, P. J. A. Alphonse:
Enhanced attribute based access control with secure deduplication for big data storage in cloud. 102-120 - Amir Mahdi Sazdar, Nasim Alikhani, Seyed Ali Ghorashi
, Ahmad Khonsari:
Privacy preserving in indoor fingerprint localization and radio map expansion. 121-134 - M'hammed Achour
, Mohammed Mana, Abderrezak Rachedi:
On the issues of selective jamming in IEEE 802.15.4-based wireless body area networks. 135-150 - Lili Jiang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic
, Runkai Yang:
Performance analysis of heterogeneous cloud-edge services: A modeling approach. 151-163 - Zhixin Liu
, Xi Han, Yuanai Xie
, Yazhou Yuan, Kit Yan Chan:
Energy-efficiency maximization in D2D-enabled vehicular communications with consideration of dynamic channel information and fairness. 164-176 - Bipasha Mahato, Deepsubhra Guha Roy
, Debashis De:
Distributed bandwidth selection approach for cooperative peer to peer multi-cloud platform. 177-201 - Tianqi Zhang
, Haibo Zhou, Bo Qian, Yunting Xu, Tianxiong Wu, Ting Ma:
A scalable unsignalized intersection system for automated vehicles and semi-physical implementation. 202-214 - Mahmoud M. Selim
, Mohamed Rihan, Yatao Yang, Junxian Ma:
Optimal task partitioning, Bit allocation and trajectory for D2D-assisted UAV-MEC systems. 215-224 - Yiming Hei, Yizhong Liu, Dawei Li
, Jianwei Liu
, Qianhong Wu:
Themis: An accountable blockchain-based P2P cloud storage scheme. 225-239 - Prakasam Periasamy
, Md Shohel Sayeed, J. Ajayan:
Guest editorials: P2P computing for 5G, beyond 5G (B5G) networks and internet-of-everything (IoE). 240-242 - Steffi Jayakumar, S. Nandakumar
:
A review on resource allocation techniques in D2D communication for 5G and B5G technology. 243-269 - A. Senthil Kumar, V. Thirunavukkarasu:
Peer to peer communication framework for 5G networks using Ambient Service. 270-278 - Divya Mohan
, Geetha Mary Amalanathan
:
The efficacy of handoff strategy based spectrum allocation using TSB-MFO for D2D and CU communications. 279-295 - Noor Mohammed Vali Mohamad, Prasun Ambastha, Sukriti Gautam, Rishabh Jain, Hariharan Subramaniyam
, Lakshmanan Muthukaruppan:
Dynamic Sectorization and parallel processing for device-to-device (D2D) resource allocation in 5G and B5G cellular network. 296-304 - Mehmet Bilim
:
Dual-branch SC wireless systems with HQAM for beyond 5G over η-μ fading channels. 305-318 - J. Christopher Clement
, N. Indira, Ponnusamy Vijayakumar
, Ramasamy Nandakumar:
Deep learning based modulation classification for 5G and beyond wireless systems. 319-332 - Malini Balachandran, Noor Mohammed Vali Mohamad:
Joint power optimization and scaled beamforming approach in B5G network based massive MIMO enabled HetNet with full-duplex small cells. 333-348 - D. P. Acharjya
, N. Syed Siraj Ahmed
:
Tracing of online assaults in 5G networks using dominance based rough set and formal concept analysis. 349-374 - T. R. Reshmi
, M. Azath:
Improved self-healing technique for 5G networks using predictive analysis. 375-391 - S. Perumal Sankar, T. D. Subash, N. Vishwanath, Deepa Elizabeth Geroge:
Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things. 392-402 - Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy
:
BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. 403-419 - Pankaj Kumar, Lokesh Chouhan
:
A secure authentication scheme for IoT application in smart home. 420-438 - Riya, Nitin Gupta
, Sanjay Kumar Dhurandher:
Efficient caching method in fog computing for internet of everything. 439-452
Volume 14, Number 2, March 2021
- Tri Gia Nguyen, Trung V. Phan, Hai Hoang Nguyen, Phet Aimtongkham, Chakchai So-In
:
An efficient distributed algorithm for target-coverage preservation in wireless sensor networks. 453-466 - Feng Zeng
, Yaojia Chen, Lan Yao
, Jinsong Wu:
A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing. 467-481 - Yong Ding, Decun Luo, Hengkui Xiang, Wenyao Liu, Yujue Wang:
Design and implementation of blockchain-based digital advertising media promotion system. 482-496 - Qian Wang, Zhihua Cui, Lifang Wang:
Charging path optimization for wireless rechargeable sensor network. 497-506 - Yanwu Ding
, Yazan Ibdah:
Simulation models for mobile-to-mobile channels with isotropic and nonisotropic scattering. 507-527 - Haobin Jiang, Lei Hua, Lukuman Wahab
:
SAES: A self-checking authentication scheme with higher efficiency and security for VANET. 528-540 - Amir Nader Shahbaz, Hamid Barati
, Ali Barati
:
Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks. 541-558 - Oluwafolake Ojo
, Ayodeji Oluwatope, Suraju Olusegun Ajadi:
A reliable peer-to-peer streaming protocol in low-capacity networks. 559-584 - Prasad Challa
, B. Eswara Reddy:
Construction of multi-level data aggregation trees for energy efficiency and delivery delay in machine-to-machine communications. 585-598 - Peiyan Yuan, Rong Huang
:
Integrating the device-to-device communication technology into edge computing: A case study. 599-608 - Mina Malekzadeh:
Developing new connectivity architectures for local sensing and control IoT systems. 609-626 - Abderrahim Guerna
, Salim Bitam
, Carlos T. Calafate:
AC-RDV: a novel ant colony system for roadside units deployment in vehicular ad hoc networks. 627-643 - Jieyu Xu, Wen Bai, Miao Hu, Haibo Tian, Di Wu
:
Bitcoin miners: Exploring a covert community in the Bitcoin ecosystem. 644-654 - Zuyan Wang
, Jun Tao
, Yang Gao
, Yifan Xu, Weice Sun, Xiaoyan Li:
A precision adjustable trajectory planning scheme for UAV-based data collection in IoTs. 655-671 - Debashis Das
, Sourav Banerjee
, Utpal Biswas:
A secure vehicle theft detection framework using Blockchain and smart contract. 672-686 - Weverton Cordeiro
, Luciano Paschoal Gaspary, Rafael Duarte Beltran
, Kayuã Oleques Paim, Rodrigo B. Mansilha:
Revisiting the coupon collector's problem to unveil users' online sessions in networked systems. 687-707 - Mohammad Saiful Islam Mamun, Atsuko Miyaji, Rongxing Lu, Chunhua Su:
A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT. 708-721 - Lein Harn, Zhe Xia, Chingfang Hsu
:
Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks. 722-728 - Elahe Khatibi, Mohsen Sharifi
:
Resource discovery mechanisms in pure unstructured peer-to-peer systems: a comprehensive survey. 729-746 - Vani Rajasekar
, J. Premalatha, K. Sathya:
Cancelable Iris template for secure authentication based on random projection and double random phase encoding. 747-762 - Guisong Yang, Yanglin Zhang, Buye Wang, Xingyu He
, Jiangtao Wang
, Ming Liu:
Task allocation through fuzzy logic based participant density analysis in mobile crowd sensing. 763-780 - Sahar Zargarzadeh, Neda Moghim
, Behrouz Shahgholi Ghahfarokhi:
A consensus-based cooperative Spectrum sensing technique for CR-VANET. 781-793 - Songzhu Zhang, Xingwei Wang, Jianhui Lv
, Min Huang:
Light forwarding based optimal CCN content delivery: a case study in metropolitan area network. 794-806 - Vishal Kumar Arora
, Vishal Sharma
:
A novel energy-efficient balanced multi-hop routing scheme (EBMRS) for wireless sensor networks. 807-820 - Irin Loretta G, V. Kavitha:
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment. 821-836 - Kun Tang, Shaowei Liao, Jian Dong, Ronghua Shi:
Spectrum sharing protocol in two-way cognitive radio networks with energy accumulation in relay node. 837-851 - Bin Wu
, Caifen Wang, Hailong Yao:
A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT. 852-872 - Elham Hasheminejad, Hamid Barati
:
A reliable tree-based data aggregation method in wireless sensor networks. 873-887 - Ruchir Gupta
, Yatindra Nath Singh, Antriksh Goswami
:
Trust estimation in peer-to-peer network using BLUE. 888-897 - Junyan Guo, Ye Du
:
A secure three-factor anonymous roaming authentication protocol using ECC for space information networks. 898-916 - Shamsher Ullah
, Nizamud Din:
Blind signcryption scheme based on hyper elliptic curves cryptosystem. 917-932 - Xu Wu:
Cross-domain trust management mechanism for internet of things systems. 933-947 - Sheng Yin, Jia Wu, Genghua Yu:
Low energy consumption routing algorithm based on message importance in opportunistic social networks. 948-961 - Judy C. Guevara
, Nelson L. S. da Fonseca
:
Task scheduling in cloud-fog computing systems. 962-977 - Sakshi Garg, Deepti Mehrotra
, Hari Mohan Pandey
, Sujata Pandey
:
Accessible review of internet of vehicle models for intelligent transportation and research gaps for potential future directions. 978-1005 - Jia Wu, Jingge Qu, Genghua Yu:
Behavior prediction based on interest characteristic and user communication in opportunistic social networks. 1006-1018 - Malini Balachandran, Noor Mohammed Vali Mohamad:
Correction to: Joint power optimization and scaled beamforming approach in B5G network based massive MIMO enabled HetNet with full-duplex small cells. 1019
Volume 14, Number 3, May 2021
- Elham Adibi, Ehsan Mousavi Khaneghah
:
A mathematical model to describe resource discovery failure in distributed exascale computing systems. 1021-1043 - Rajasekhar Bandapalle Mulinti, M. Nagendra:
An efficient latency aware resource provisioning in cloud assisted mobile edge framework. 1044-1057 - Nan Zhao, Nianmin Yao, Zhenguo Gao:
A message transmission scheduling algorithm based on time-domain interference alignment in UWANs. 1058-1070 - Haoran Hu
, Wei Chang:
Non-cryptography countermeasure against controllable event triggering attack in WSNs. 1071-1087 - Varun Kurri, Vishweshvaran Raja, Prakasam Periasamy
:
Cellular traffic prediction on blockchain-based mobile networks using LSTM model in 4G LTE network. 1088-1105 - Hanshu Hong
, Zhixin Sun:
A secure peer to peer multiparty transaction scheme based on blockchain. 1106-1117 - Davood Behzad, Nazbanoo Farzaneh
:
A novel trust management method to preserve privacy in vehicular ad-hoc networks. 1118-1131 - A. Samson Arun Raj, Yogesh Palanichamy:
Packet classification based aerial intelligent relay-road side unit (air-rsu) framework for vehicular ad-hoc networks. 1132-1153 - Marwa Ibrahim
, Hassan Harb, Ali Mansour
, Abbass Nasser, Christophe Osswald:
All-in-one: Toward hybrid data collection and energy saving mechanism in sensing-based IoT applications. 1154-1173 - Navya Vuppalapati
, T. G. Venkatesh
:
Modeling & analysis of software defined networks under non-stationary conditions. 1174-1189 - Chao Bu, Jinsong Wang:
Computing tasks assignment optimization among edge computing servers via SDN. 1190-1206 - Yipin Zhang, Xiaolin Chang
, Jelena V. Misic, Vojislav B. Misic, Yutong Cai:
Cost-effective migration-based dynamic platform defense technique: a CTMDP approach. 1207-1217 - Nitin Singha
, Yatindra Nath Singh:
New incentive mechanism to enhance cooperation in wireless P2P networks. 1218-1228 - C. Gopala Krishnan, S. Gomathi, Anusha Bamini A. M:
High energy efficient lifetime management system and trust management framework for manet using self-configurable cluster mechanism. 1229-1241 - Nitin Shukla
, Dipmalya Datta, Mayank Pandey, Shashank Srivastava:
Towards software defined low maintenance structured peer-to-peer overlays. 1242-1260 - Alla Abbas Khadir, Seyed-Amin Hosseini-Seno
:
SDN-based offloading policy to reduce the delay in fog-vehicular networks. 1261-1275 - Alla Abbas Khadir, Seyed-Amin Hosseini-Seno
:
Correction to: SDN-based offloading policy to reduce the delay in fog-vehicular networks. 1276 - Abhay Kumar Agrahari
, Shirshu Varma:
A provably secure RFID authentication protocol based on ECQV for the medical internet of things. 1277-1289 - Umasankararao Varri
, Syam Kumar Pasupuleti
, K. V. Kadambari:
CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage. 1290-1302 - Vrajesh Kumar Chawra, Govind P. Gupta
:
Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks. 1303-1315 - Vrajesh Kumar Chawra, Govind P. Gupta
:
Correction to: Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks. 1316 - Jian Chen, Yunhe Xie, Jie Jia
, Mingyang Zhang, Qinghu Wang, Xingwei Wang:
Joint resource allocation and routing optimization for spectrum aggregation based CRAHNs. 1317-1333 - Noureddine Moussa
, Abdelbaki El Belrhiti El Alaoui:
An energy-efficient cluster-based routing protocol using unequal clustering and improved ACO techniques for WSNs. 1334-1347 - Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan, David S. L. Wei:
Advances in privacy-preserving computing. 1348-1352 - Li Chen
, Ke Zhang:
Privacy-aware smart card based biometric authentication scheme for e-health. 1353-1365 - Yinghui Zhang, Jian Zou
, Rui Guo:
Efficient privacy-preserving authentication for V2G networks. 1366-1378 - Qianjun Wei, Qiang Li
, Zhipeng Zhou, Zhengqiang Ge, Yonggang Zhang:
Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing. 1379-1387 - Xin Ye, Jin Zhou
, Yuedi Li, Mingsheng Cao, Dajiang Chen, Zhiguang Qin:
A location privacy protection scheme for convoy driving in autonomous driving era. 1388-1400 - Xiaofei Bu, Yu-e Sun, Yang Du, Xiaocan Wu, Boyu Zhang, He Huang
:
A novel spread estimation based abnormal flow detection in high-speed networks. 1401-1413 - Yi Xu
, Changgen Peng, Weijie Tan
, Youliang Tian, Minyao Ma, Hongfa Ding:
High-throughput secure multiparty multiplication protocol via bipartite graph partitioning. 1414-1430 - Yuqi Fan
, Zhifeng Jin, Guangming Shen, Donghui Hu, Lei Shi, Xiaohui Yuan:
Three-stage Stackelberg game based edge computing resource management for mobile blockchain. 1431-1445 - Cong Yu, Donghui Hu
, Shuli Zheng, Wenjie Jiang, Meng Li, Zhong-Qiu Zhao:
An improved steganography without embedding based on attention GAN. 1446-1457 - Mingfu Xue
, Can He, Jian Wang, Weiqiang Liu:
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems. 1458-1474 - Bang Tran, Xiaohui Liang:
Exploiting peer-to-peer communications for query privacy preservation in voice assistant systems. 1475-1487 - Jin Gu, Jianqiang Shen, Baoyun Wang:
A robust and secure multi-authority access control system for cloud storage. 1488-1499 - Edgar Batista
, Agusti Solanas
:
A uniformization-based approach to preserve individuals' privacy during process mining analyses. 1500-1519 - Yabin Xu
, Bin Shi:
Copyright protection method of big data based on nash equilibrium and constraint optimization. 1520-1530 - Zihao Zhu, Yulin Xu, Zhou Su:
A reputation-based cooperative content delivery with parking vehicles in vehicular ad-hoc networks. 1531-1547 - Diksha Rangwani, Dipanwita Sadhukhan, Sangram Ray
, Muhammad Khurram Khan, Mou Dasgupta:
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things. 1548-1571 - Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy
:
Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment. 1572-1595 - Yuanming Zhang
, Jing Tao, Shuo Zhang, Yuchao Zhang, Pinghui Wang:
A machine learning based approach for user privacy preservation in social networks. 1596-1607 - Shashidhar Virupaksha
, Venkatesulu Dondeti:
Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data. 1608-1628 - J. Andrew Onesimu
, J. Karthikeyan, Yuichi Sei:
An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services. 1629-1649 - D. Hemkumar, Sadam Ravichandra, Durvasula V. L. N. Somayajulu:
Impact of data correlation on privacy budget allocation in continuous publication of location statistics. 1650-1665 - Luis Bernardo Pulido-Gaytan
, Andrei Tchernykh
, Jorge M. Cortés-Mendoza
, Mikhail G. Babenko
, Gleb I. Radchenko
, Arutyun Avetisyan
, Alexander Yu. Drozdov
:
Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities. 1666-1691 - Longfei Zheng, Jun Zhou, Chaochao Chen
, Bingzhe Wu, Li Wang, Benyu Zhang:
ASFGNN: Automated separated-federated graph neural network. 1692-1704 - William L. Croft, Jörg-Rüdiger Sack, Wei Shi:
Obfuscation of images via differential privacy: From facial images to general images. 1705-1733 - Ying Li, R. K. Shyamasundar, Mohammad S. Obaidat, Yuyu Yin
:
Guest editorial special issue on "P2P computing for deep learning". 1734-1735 - Xiaojing Yin, Jiwei Huang, Wei He, Wei Guo, Han Yu
, Lizhen Cui
:
Group task allocation approach for heterogeneous software crowdsourcing tasks. 1736-1747