default search action
Peer-to-Peer Networking and Applications, Volume 14
Volume 14, Number 1, January 2021
- Abdennour Zekri, Weijia Jia:
Performance evaluation of rate adaptation algorithms for seamless heterogeneous vehicular communications. 1-17 - Hardik Dhingra, Gagan Deep Dhand, Rashmi Chawla, Shailender Gupta:
An integrated service model to support user specific QoS routing in cognitive radio ad hoc network. 18-29 - S. Balamurugan, Ayyasamy Ayyanar, K. Suresh Joseph:
Enhanced petri nets for traceability of food management using internet of things. 30-43 - Saunhita Sapre, S. Mini:
A differential moth flame optimization algorithm for mobile sink trajectory. 44-57 - Yuvaraj N, Saravanan G:
Markov transition and smart cache congestion control for IoT enabled wireless mesh networks. 58-68 - Xiaoying Shen, Licheng Wang, Qingqi Pei, Yuan Liu, Miaomiao Li:
Location privacy-preserving in online taxi-hailing services. 69-81 - Vinod Kumar, Rajendra Kumar, Santosh K. Pandey:
LKM-AMI: A Lightweight Key Management Scheme for Secure two Way Communications between Smart Meters and HAN Devices of AMI System in Smart Grid. 82-100 - Vinod Kumar, Rajendra Kumar, Santosh K. Pandey:
Correction to: LKM-AMI: A Lightweight Key Management Scheme for Secure two Way Communications between Smart Meters and HAN Devices of AMI System in Smart Grid. 101 - Praveen Kumar Premkamal, Syam Kumar Pasupuleti, Abhishek Kumar Singh, P. J. A. Alphonse:
Enhanced attribute based access control with secure deduplication for big data storage in cloud. 102-120 - Amir Mahdi Sazdar, Nasim Alikhani, Seyed Ali Ghorashi, Ahmad Khonsari:
Privacy preserving in indoor fingerprint localization and radio map expansion. 121-134 - M'hammed Achour, Mohammed Mana, Abderrezak Rachedi:
On the issues of selective jamming in IEEE 802.15.4-based wireless body area networks. 135-150 - Lili Jiang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Runkai Yang:
Performance analysis of heterogeneous cloud-edge services: A modeling approach. 151-163 - Zhixin Liu, Xi Han, Yuanai Xie, Yazhou Yuan, Kit Yan Chan:
Energy-efficiency maximization in D2D-enabled vehicular communications with consideration of dynamic channel information and fairness. 164-176 - Bipasha Mahato, Deepsubhra Guha Roy, Debashis De:
Distributed bandwidth selection approach for cooperative peer to peer multi-cloud platform. 177-201 - Tianqi Zhang, Haibo Zhou, Bo Qian, Yunting Xu, Tianxiong Wu, Ting Ma:
A scalable unsignalized intersection system for automated vehicles and semi-physical implementation. 202-214 - Mahmoud M. Selim, Mohamed Rihan, Yatao Yang, Junxian Ma:
Optimal task partitioning, Bit allocation and trajectory for D2D-assisted UAV-MEC systems. 215-224 - Yiming Hei, Yizhong Liu, Dawei Li, Jianwei Liu, Qianhong Wu:
Themis: An accountable blockchain-based P2P cloud storage scheme. 225-239 - Prakasam Periasamy, Md Shohel Sayeed, J. Ajayan:
Guest editorials: P2P computing for 5G, beyond 5G (B5G) networks and internet-of-everything (IoE). 240-242 - Steffi Jayakumar, S. Nandakumar:
A review on resource allocation techniques in D2D communication for 5G and B5G technology. 243-269 - A. Senthil Kumar, V. Thirunavukkarasu:
Peer to peer communication framework for 5G networks using Ambient Service. 270-278 - Divya Mohan, Geetha Mary Amalanathan:
The efficacy of handoff strategy based spectrum allocation using TSB-MFO for D2D and CU communications. 279-295 - Noor Mohammed Vali Mohamad, Prasun Ambastha, Sukriti Gautam, Rishabh Jain, Hariharan Subramaniyam, Lakshmanan Muthukaruppan:
Dynamic Sectorization and parallel processing for device-to-device (D2D) resource allocation in 5G and B5G cellular network. 296-304 - Mehmet Bilim:
Dual-branch SC wireless systems with HQAM for beyond 5G over η-μ fading channels. 305-318 - J. Christopher Clement, N. Indira, Ponnusamy Vijayakumar, Ramasamy Nandakumar:
Deep learning based modulation classification for 5G and beyond wireless systems. 319-332 - Malini Balachandran, Noor Mohammed Vali Mohamad:
Joint power optimization and scaled beamforming approach in B5G network based massive MIMO enabled HetNet with full-duplex small cells. 333-348 - D. P. Acharjya, N. Syed Siraj Ahmed:
Tracing of online assaults in 5G networks using dominance based rough set and formal concept analysis. 349-374 - T. R. Reshmi, M. Azath:
Improved self-healing technique for 5G networks using predictive analysis. 375-391 - S. Perumal Sankar, T. D. Subash, N. Vishwanath, Deepa Elizabeth Geroge:
Security improvement in block chain technique enabled peer to peer network for beyond 5G and internet of things. 392-402 - Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy:
BIDAPSCA5G: Blockchain based Internet of Things (IoT) device to device authentication protocol for smart city applications using 5G technology. 403-419 - Pankaj Kumar, Lokesh Chouhan:
A secure authentication scheme for IoT application in smart home. 420-438 - Riya, Nitin Gupta, Sanjay Kumar Dhurandher:
Efficient caching method in fog computing for internet of everything. 439-452
Volume 14, Number 2, March 2021
- Tri Gia Nguyen, Trung V. Phan, Hai Hoang Nguyen, Phet Aimtongkham, Chakchai So-In:
An efficient distributed algorithm for target-coverage preservation in wireless sensor networks. 453-466 - Feng Zeng, Yaojia Chen, Lan Yao, Jinsong Wu:
A novel reputation incentive mechanism and game theory analysis for service caching in software-defined vehicle edge computing. 467-481 - Yong Ding, Decun Luo, Hengkui Xiang, Wenyao Liu, Yujue Wang:
Design and implementation of blockchain-based digital advertising media promotion system. 482-496 - Qian Wang, Zhihua Cui, Lifang Wang:
Charging path optimization for wireless rechargeable sensor network. 497-506 - Yanwu Ding, Yazan Ibdah:
Simulation models for mobile-to-mobile channels with isotropic and nonisotropic scattering. 507-527 - Haobin Jiang, Lei Hua, Lukuman Wahab:
SAES: A self-checking authentication scheme with higher efficiency and security for VANET. 528-540 - Amir Nader Shahbaz, Hamid Barati, Ali Barati:
Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks. 541-558 - Oluwafolake Ojo, Ayodeji Oluwatope, Suraju Olusegun Ajadi:
A reliable peer-to-peer streaming protocol in low-capacity networks. 559-584 - Prasad Challa, B. Eswara Reddy:
Construction of multi-level data aggregation trees for energy efficiency and delivery delay in machine-to-machine communications. 585-598 - Peiyan Yuan, Rong Huang:
Integrating the device-to-device communication technology into edge computing: A case study. 599-608 - Mina Malekzadeh:
Developing new connectivity architectures for local sensing and control IoT systems. 609-626 - Abderrahim Guerna, Salim Bitam, Carlos T. Calafate:
AC-RDV: a novel ant colony system for roadside units deployment in vehicular ad hoc networks. 627-643 - Jieyu Xu, Wen Bai, Miao Hu, Haibo Tian, Di Wu:
Bitcoin miners: Exploring a covert community in the Bitcoin ecosystem. 644-654 - Zuyan Wang, Jun Tao, Yang Gao, Yifan Xu, Weice Sun, Xiaoyan Li:
A precision adjustable trajectory planning scheme for UAV-based data collection in IoTs. 655-671 - Debashis Das, Sourav Banerjee, Utpal Biswas:
A secure vehicle theft detection framework using Blockchain and smart contract. 672-686 - Weverton Cordeiro, Luciano Paschoal Gaspary, Rafael Duarte Beltran, Kayuã Oleques Paim, Rodrigo B. Mansilha:
Revisiting the coupon collector's problem to unveil users' online sessions in networked systems. 687-707 - Mohammad Saiful Islam Mamun, Atsuko Miyaji, Rongxing Lu, Chunhua Su:
A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT. 708-721 - Lein Harn, Zhe Xia, Chingfang Hsu:
Non-interactive secure multi-party arithmetic computations with confidentiality for P2P networks. 722-728 - Elahe Khatibi, Mohsen Sharifi:
Resource discovery mechanisms in pure unstructured peer-to-peer systems: a comprehensive survey. 729-746 - Vani Rajasekar, J. Premalatha, K. Sathya:
Cancelable Iris template for secure authentication based on random projection and double random phase encoding. 747-762 - Guisong Yang, Yanglin Zhang, Buye Wang, Xingyu He, Jiangtao Wang, Ming Liu:
Task allocation through fuzzy logic based participant density analysis in mobile crowd sensing. 763-780 - Sahar Zargarzadeh, Neda Moghim, Behrouz Shahgholi Ghahfarokhi:
A consensus-based cooperative Spectrum sensing technique for CR-VANET. 781-793 - Songzhu Zhang, Xingwei Wang, Jianhui Lv, Min Huang:
Light forwarding based optimal CCN content delivery: a case study in metropolitan area network. 794-806 - Vishal Kumar Arora, Vishal Sharma:
A novel energy-efficient balanced multi-hop routing scheme (EBMRS) for wireless sensor networks. 807-820 - Irin Loretta G, V. Kavitha:
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment. 821-836 - Kun Tang, Shaowei Liao, Jian Dong, Ronghua Shi:
Spectrum sharing protocol in two-way cognitive radio networks with energy accumulation in relay node. 837-851 - Bin Wu, Caifen Wang, Hailong Yao:
A certificateless linearly homomorphic signature scheme for network coding and its application in the IoT. 852-872 - Elham Hasheminejad, Hamid Barati:
A reliable tree-based data aggregation method in wireless sensor networks. 873-887 - Ruchir Gupta, Yatindra Nath Singh, Antriksh Goswami:
Trust estimation in peer-to-peer network using BLUE. 888-897 - Junyan Guo, Ye Du:
A secure three-factor anonymous roaming authentication protocol using ECC for space information networks. 898-916 - Shamsher Ullah, Nizamud Din:
Blind signcryption scheme based on hyper elliptic curves cryptosystem. 917-932 - Xu Wu:
Cross-domain trust management mechanism for internet of things systems. 933-947 - Sheng Yin, Jia Wu, Genghua Yu:
Low energy consumption routing algorithm based on message importance in opportunistic social networks. 948-961 - Judy C. Guevara, Nelson L. S. da Fonseca:
Task scheduling in cloud-fog computing systems. 962-977 - Sakshi Garg, Deepti Mehrotra, Hari Mohan Pandey, Sujata Pandey:
Accessible review of internet of vehicle models for intelligent transportation and research gaps for potential future directions. 978-1005 - Jia Wu, Jingge Qu, Genghua Yu:
Behavior prediction based on interest characteristic and user communication in opportunistic social networks. 1006-1018 - Malini Balachandran, Noor Mohammed Vali Mohamad:
Correction to: Joint power optimization and scaled beamforming approach in B5G network based massive MIMO enabled HetNet with full-duplex small cells. 1019
Volume 14, Number 3, May 2021
- Elham Adibi, Ehsan Mousavi Khaneghah:
A mathematical model to describe resource discovery failure in distributed exascale computing systems. 1021-1043 - Rajasekhar Bandapalle Mulinti, M. Nagendra:
An efficient latency aware resource provisioning in cloud assisted mobile edge framework. 1044-1057 - Nan Zhao, Nianmin Yao, Zhenguo Gao:
A message transmission scheduling algorithm based on time-domain interference alignment in UWANs. 1058-1070 - Haoran Hu, Wei Chang:
Non-cryptography countermeasure against controllable event triggering attack in WSNs. 1071-1087 - Varun Kurri, Vishweshvaran Raja, Prakasam Periasamy:
Cellular traffic prediction on blockchain-based mobile networks using LSTM model in 4G LTE network. 1088-1105 - Hanshu Hong, Zhixin Sun:
A secure peer to peer multiparty transaction scheme based on blockchain. 1106-1117 - Davood Behzad, Nazbanoo Farzaneh:
A novel trust management method to preserve privacy in vehicular ad-hoc networks. 1118-1131 - A. Samson Arun Raj, Yogesh Palanichamy:
Packet classification based aerial intelligent relay-road side unit (air-rsu) framework for vehicular ad-hoc networks. 1132-1153 - Marwa Ibrahim, Hassan Harb, Ali Mansour, Abbass Nasser, Christophe Osswald:
All-in-one: Toward hybrid data collection and energy saving mechanism in sensing-based IoT applications. 1154-1173 - Navya Vuppalapati, T. G. Venkatesh:
Modeling & analysis of software defined networks under non-stationary conditions. 1174-1189 - Chao Bu, Jinsong Wang:
Computing tasks assignment optimization among edge computing servers via SDN. 1190-1206 - Yipin Zhang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic, Yutong Cai:
Cost-effective migration-based dynamic platform defense technique: a CTMDP approach. 1207-1217 - Nitin Singha, Yatindra Nath Singh:
New incentive mechanism to enhance cooperation in wireless P2P networks. 1218-1228 - C. Gopala Krishnan, S. Gomathi, Anusha Bamini A. M:
High energy efficient lifetime management system and trust management framework for manet using self-configurable cluster mechanism. 1229-1241 - Nitin Shukla, Dipmalya Datta, Mayank Pandey, Shashank Srivastava:
Towards software defined low maintenance structured peer-to-peer overlays. 1242-1260 - Alla Abbas Khadir, Seyed-Amin Hosseini-Seno:
SDN-based offloading policy to reduce the delay in fog-vehicular networks. 1261-1275 - Alla Abbas Khadir, Seyed-Amin Hosseini-Seno:
Correction to: SDN-based offloading policy to reduce the delay in fog-vehicular networks. 1276 - Abhay Kumar Agrahari, Shirshu Varma:
A provably secure RFID authentication protocol based on ECQV for the medical internet of things. 1277-1289 - Umasankararao Varri, Syam Kumar Pasupuleti, K. V. Kadambari:
CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage. 1290-1302 - Vrajesh Kumar Chawra, Govind P. Gupta:
Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks. 1303-1315 - Vrajesh Kumar Chawra, Govind P. Gupta:
Correction to: Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks. 1316 - Jian Chen, Yunhe Xie, Jie Jia, Mingyang Zhang, Qinghu Wang, Xingwei Wang:
Joint resource allocation and routing optimization for spectrum aggregation based CRAHNs. 1317-1333 - Noureddine Moussa, Abdelbaki El Belrhiti El Alaoui:
An energy-efficient cluster-based routing protocol using unequal clustering and improved ACO techniques for WSNs. 1334-1347 - Kaiping Xue, Zhe Liu, Haojin Zhu, Miao Pan, David S. L. Wei:
Advances in privacy-preserving computing. 1348-1352 - Li Chen, Ke Zhang:
Privacy-aware smart card based biometric authentication scheme for e-health. 1353-1365 - Yinghui Zhang, Jian Zou, Rui Guo:
Efficient privacy-preserving authentication for V2G networks. 1366-1378 - Qianjun Wei, Qiang Li, Zhipeng Zhou, Zhengqiang Ge, Yonggang Zhang:
Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing. 1379-1387 - Xin Ye, Jin Zhou, Yuedi Li, Mingsheng Cao, Dajiang Chen, Zhiguang Qin:
A location privacy protection scheme for convoy driving in autonomous driving era. 1388-1400 - Xiaofei Bu, Yu-e Sun, Yang Du, Xiaocan Wu, Boyu Zhang, He Huang:
A novel spread estimation based abnormal flow detection in high-speed networks. 1401-1413 - Yi Xu, Changgen Peng, Weijie Tan, Youliang Tian, Minyao Ma, Hongfa Ding:
High-throughput secure multiparty multiplication protocol via bipartite graph partitioning. 1414-1430 - Yuqi Fan, Zhifeng Jin, Guangming Shen, Donghui Hu, Lei Shi, Xiaohui Yuan:
Three-stage Stackelberg game based edge computing resource management for mobile blockchain. 1431-1445 - Cong Yu, Donghui Hu, Shuli Zheng, Wenjie Jiang, Meng Li, Zhong-Qiu Zhao:
An improved steganography without embedding based on attention GAN. 1446-1457 - Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems. 1458-1474 - Bang Tran, Xiaohui Liang:
Exploiting peer-to-peer communications for query privacy preservation in voice assistant systems. 1475-1487 - Jin Gu, Jianqiang Shen, Baoyun Wang:
A robust and secure multi-authority access control system for cloud storage. 1488-1499 - Edgar Batista, Agusti Solanas:
A uniformization-based approach to preserve individuals' privacy during process mining analyses. 1500-1519 - Yabin Xu, Bin Shi:
Copyright protection method of big data based on nash equilibrium and constraint optimization. 1520-1530 - Zihao Zhu, Yulin Xu, Zhou Su:
A reputation-based cooperative content delivery with parking vehicles in vehicular ad-hoc networks. 1531-1547 - Diksha Rangwani, Dipanwita Sadhukhan, Sangram Ray, Muhammad Khurram Khan, Mou Dasgupta:
A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things. 1548-1571 - Manojkumar Vivekanandan, V. N. Sastry, U. Srinivasulu Reddy:
Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment. 1572-1595 - Yuanming Zhang, Jing Tao, Shuo Zhang, Yuchao Zhang, Pinghui Wang:
A machine learning based approach for user privacy preservation in social networks. 1596-1607 - Shashidhar Virupaksha, Venkatesulu Dondeti:
Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data. 1608-1628 - J. Andrew Onesimu, J. Karthikeyan, Yuichi Sei:
An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services. 1629-1649 - D. Hemkumar, Sadam Ravichandra, Durvasula V. L. N. Somayajulu:
Impact of data correlation on privacy budget allocation in continuous publication of location statistics. 1650-1665 - Luis Bernardo Pulido-Gaytan, Andrei Tchernykh, Jorge M. Cortés-Mendoza, Mikhail G. Babenko, Gleb I. Radchenko, Arutyun Avetisyan, Alexander Yu. Drozdov:
Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities. 1666-1691 - Longfei Zheng, Jun Zhou, Chaochao Chen, Bingzhe Wu, Li Wang, Benyu Zhang:
ASFGNN: Automated separated-federated graph neural network. 1692-1704 - William L. Croft, Jörg-Rüdiger Sack, Wei Shi:
Obfuscation of images via differential privacy: From facial images to general images. 1705-1733 - Ying Li, R. K. Shyamasundar, Mohammad S. Obaidat, Yuyu Yin:
Guest editorial special issue on "P2P computing for deep learning". 1734-1735 - Xiaojing Yin, Jiwei Huang, Wei He, Wei Guo, Han Yu, Lizhen Cui:
Group task allocation approach for heterogeneous software crowdsourcing tasks. 1736-1747 - Xu Ding, Jing Wang, Chong Zhao, Peng Zhang, Yucheng Wu, Honghao Gao:
The throughput optimization for wireless sensor networks adopting interference alignment and successive interference cancellation. 1748-1764 - Pengcheng Zhang, Wennan Cao, Wenrui Li:
Surface and high-altitude combined rainfall forecasting using convolutional neural network. 1765-1777 - Sahil Khatri, Hrishikesh Vachhani, Shalin Shah, Jitendra Bhatia, Manish Chaturvedi, Sudeep Tanwar, Neeraj Kumar:
Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges. 1778-1805 - Yu Weng, Zehua Chen, Tianbao Zhou:
Improved differentiable neural architecture search for single image super-resolution. 1806-1815 - Fang Yang, Fuzhong Li, Kai Zhang, Wuping Zhang, Shancang Li:
Influencing factors analysis in pear disease recognition using deep learning. 1816-1828 - Xiaolong Xu, Haoyan Xu, Yang Wang, Jing Zhang:
AENEA: A novel autoencoder-based network embedding algorithm. 1829-1840
Volume 14, Number 4, July 2021
- Chang Xu, Jiachen Wang, Liehuang Zhu, Kashif Sharif, Chuan Zhang, Can Zhang:
Enabling privacy-preserving multi-level attribute based medical service recommendation in eHealthcare systems. 1841-1853 - Zhong Li, Xueting Yang, Changjun Jiang:
Tree-searching based trust assessment through communities in vehicular networks. 1854-1868 - Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen:
Correction to: A digital rights management system based on a scalable blockchain. 1869 - Moeenuddin Tariq, Muhammad Ayaz, Fazli Subhan, Muhammad Zahid Abbas:
Energy efficient and link reliable routing (E2LR) scheme for underwater sensor networks. 1870-1888 - Shuai Zhou, Ting Zhang, Xianfu Meng:
iForest: An informed resource search strategy in mobile P2P networks. 1889-1904 - Fayez Alqahtani, Mohammed Amoon, Aida A. Nasr:
Reliable scheduling and load balancing for requests in cloud-fog computing. 1905-1916 - Efat Yousefpoor, Hamid Barati, Ali Barati:
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks. 1917-1942 - Kavita Jaiswal, Veena Anand:
A Grey-Wolf based Optimized Clustering approach to improve QoS in wireless sensor networks for IoT applications. 1943-1962 - Xu Qin, Guanglun Huang, Baoxian Zhang, Cheng Li:
Energy efficient data correlation aware opportunistic routing protocol for wireless sensor networks. 1963-1975 - Dennison Rajesh, D. Giji Kiruba:
A probability based energy competent cluster based secured ch selection routing EC2SR protocol for smart dust. 1976-1987 - Shubhanshi Singh, Drishti Kedia, Neha Rastogi, T. Velmurugan, Prakasam Periasamy:
P2P mobility management for seamless handover using D2D communication in B5G wireless technology. 1988-1997 - Yuvaraj N, Mohanraj P:
Radial kernelized regressive merkle-damgård cryptographic hash blockchain for secure data transmission with IoT sensor node. 1998-2010 - Chengzhe Lai, Yangyang Du, Qili Guo, Dong Zheng:
A trust-based privacy-preserving friend matching scheme in social Internet of Vehicles. 2011-2025 - M. Sudha, V. P. Galdis pushparathi:
Traffic sign detection and recognition using RGSM and a novel feature extraction method. 2026-2037 - S. P. Tamizhselvi, Vijayalakshmi Muthuswamy:
Delay - aware bandwidth estimation and intelligent video transcoder in mobile cloud. 2038-2060 - Souhila Silmi, Zouina Doukha, Samira Moussaoui:
A self-localization range free protocol for wireless sensor networks. 2061-2071 - Ramakrishnan Anandkumar:
Hybrid fuzzy logic and artificial Flora optimization algorithm-based two tier cluster head selection for improving energy efficiency in WSNs. 2072-2083 - S. Jeen Shene, W. R. Sam Emmanuel:
An energy aware modified PAM clustering with cluster head modulation in Mobile cloud sensor environment. 2084-2098 - Chunhai Li, Xiaohuan Li, Yujue Wang, Yong Ding, Feng Zhao:
Anonymous and Traceable Authentication for Securing Data Sharing in Parking Edge Computing. 2099-2114 - Zhixin Liu, Xiangyun Meng, Yazhou Yuan, Yi Yang, Kit Yan Chan:
Joint optimization for throughput maximization in underwater acoustic networks with energy harvesting. 2115-2126 - Masahiro Sasabe:
Analysis of minimum distribution time of tit-for-tat-based P2P file distribution: Linear programming based approach. 2127-2138 - Mengying Jia, Jie Zhu, Haiping Huang:
Energy and delay-ware massive task scheduling in fog-cloud computing system. 2139-2155 - Min Zhou, Yandong Zheng, Yunguo Guan, Limin Peng, Rongxing Lu:
Efficient and privacy-preserving range-max query in fog-based agricultural IoT. 2156-2170 - Xiaopeng Yang, Hui Zhu, Fengwei Wang, Songnian Zhang, Rongxing Lu, Hui Li:
MASK: Efficient and privacy-preserving m-tree based biometric identification over cloud. 2171-2186 - Neeti Gupta, Anuradha Pughat, Vidushi Sharma:
A critical analysis of RPL objective functions in internet of things paradigm. 2187-2208 - Ramaprabha Jayaram, S. Prabakaran:
Adaptive cost and energy aware secure peer-to-peer computational offloading in the edge-cloud enabled healthcare system. 2209-2223 - Zheheng Rao, Yanyan Xu, Shaoming Pan:
A deep learning-based constrained intelligent routing method. 2224-2235 - Lunzhi Deng, Jianxin Shao, Zhenyu Hu:
Identity based two-party authenticated key agreement scheme for vehicular ad hoc networks. 2236-2247 - Hua Shi, Ronghua Luo, Guan Gui:
Joint offloading and energy optimization for wireless powered mobile edge computing under nonlinear EH Model. 2248-2261 - Yun Zhang, Hongwei Li, Guowen Xu, Shuai Yuan, Xiaoming Huang:
One radish, One hole: Specific adversarial training for enhancing neural network's robustness. 2262-2274 - (Withdrawn) SPAHN novel approach for PL-AG gateway discovery for internet connectivity. 2275-2284
- R. P. Meenaakshi Sundhari, L. Murali, S. Baskar, P. Mohamed Shakeel:
MDRP: Message dissemination with re-route planning method for emergency vehicle information exchange. 2285-2294 - Torki A. Altameem, Ayman Altameem:
Scalable aggregation plan (SAP) for portable network in a box (NIB) architecture. 2295-2305 - Mengnan Liu, Bing Han, Liyou Xu, Yanying Li:
CAN bus network design of bifurcated power electric tractor. 2306-2315 - Mohammad Al-Ma'aitah, Ayed Alwadain, Aldosary Saad:
Transmission adaptive mode selection (TAMS) method for internet of things device energy management. 2316-2326 - K. Nirmal, B. Janet, Rajagopal Kumar:
Analyzing and eliminating phishing threats in IoT, network and other Web applications using iterative intersection. 2327-2339 - Zafer Al-Makhadmeh, Amr Tolba:
SRAF: Scalable Resource Allocation Framework using Machine Learning in user-Centric Internet of Things. 2340-2350 - Rajan Regin, T. Menakadevi:
A novel clustering technique to stop congestion occur vehicular ad-hoc networks using node density based on received signal strength. 2361-2371 - Chunduru Anilkumar, Sumathy Subramanian:
A novel predicate based access control scheme for cloud environment using open stack swift storage. 2372-2384 - Deevi Radha Rani, G. Geethakumari:
A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment. 2385-2398 - Achyut Shankar, Perumal Pandiaraja, K. Sumathi, Thompson Stephan, Pavika Sharma:
Privacy preserving E-voting cloud system based on ID based encryption. 2399-2409 - Vamsinath Javangula, Suvarna Vani Koneru, Haritha Dasari:
High utility itemset mining using path encoding and constrained subset generation. 2410-2418 - Preethi Devan, Neelu Khare:
Sparse auto encoder driven support vector regression based deep learning model for predicting network intrusions. 2419-2429 - Suyel Namasudra, Rupak Chakraborty, Seifedine Nimer Kadry, Gunasekaran Manogaran, Bharat S. Rawal:
FAST: Fast Accessing Scheme for data Transmission in cloud computing. 2430-2442 - Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, S. Mary Saira Bhanu:
An efficient secure data deduplication method using radix trie with bloom filter (SDD-RT-BF) in cloud environment. 2443-2451 - C. Rajesh Babu, B. Amutha:
A novel energy-efficient data aggregation protocol for cognitive radio based wireless multimedia networks. 2452-2461 - M. Girija, P. Manickam, M. Ramaswami:
PriPresent: an embedded prime LightWeight block cipher for smart devices. 2462-2472 - G. Sangeetha, G. Sumathi:
An optimistic technique to detect Cache based Side Channel attacks in Cloud. 2473-2486 - Zhixian Chang:
Dynamic intelligent resource allocation for emergency situations. 2487-2494 - Binbin Jiang:
Research on wireless sensor location technology for biologic signal measuring based on intelligent bionic algorithm. 2495-2500 - Changyou Ye, Xiaowei Song, G. N. Vivekananda, V. Savitha:
Intelligent physical systems for strategic planning and management of enterprise information. 2501-2510 - Zhun Tian, Shengrui Zhang:
Application of big data optimized clustering algorithm in cloud computing environment in traffic accident forecast. 2511-2523 - Ravi Kumar D. N. S., Barani S.:
Epidemic and transmission priority based data dissemination model in vehichular adhoc networks (VANETs). 2524-2536 - Fatemehsadat Mirsadeghi, Marjan Kuchaki Rafsanjani, Brij B. Gupta:
A trust infrastructure based authentication method for clustered vehicular ad hoc networks. 2537-2553 - Osama Alfarraj:
A machine learning-assisted data aggregation and offloading system for cloud-IoT communication. 2554-2564 - Parasuraman Kumar, A. Anbarasa Kumar, C. Sahayakingsly, A. Udayakumar:
Analysis of intrusion detection in cyber attacks using DEEP learning neural networks. 2565-2584
Volume 14, Number 5, September 2021
- Na Shi, Liang Tan, Caixia Yang, Chen He, Jun-Li Xu, Yang Lu, Hao Xu:
BacS: A blockchain-based access control scheme in distributed internet of things. 2585-2599 - Hoi Yan Lam, Yung Po Tsang, Chun-Ho Wu, Valerie Tang:
Data analytics and the P2P cloud: an integrated model for strategy formulation based on customer behaviour. 2600-2617 - (Withdrawn) Issues of crowdsourcing and mobile app development through the intellectual property protection of third parties. 2618-2625
- Kairat Imanbayev, Bakhtgerey Sinchev, Saulet Sibanbayeva, Axulu Mukhanova, Assel Nurgulzhanov, Nurgali Zaurbekov, Nurbike Zaurbekova, Natalya V. Korolyova, Lyazzat Baibolova:
Analysis and mathematical modeling of big data processing. 2626-2634 - Akashdeep Bhardwaj, Syed Bilal Hussian Shah, Achyut Shankar, Mamoun Alazab, Manoj Kumar, Thippa Reddy Gadekallu:
Penetration testing framework for smart contract Blockchain. 2635-2650 - Muhammad Usama, Qutaibah M. Malluhi, Nordin Zakaria, Imran Razzak, Waheed Iqbal:
An efficient secure data compression technique based on chaos and adaptive Huffman coding. 2651-2664 - Abba Garba, Ashutosh Dhar Dwivedi, Mohsin Kamal, Gautam Srivastava, Muhammad Tariq, M. Anwar Hasan, Zhong Chen:
A digital rights management system based on a scalable blockchain. 2665-2680 - Weizheng Wang, Huakun Huang, Lejun Zhang, Chunhua Su:
Secure and efficient mutual authentication protocol for smart grid under blockchain. 2681-2693 - Dan Liao, Hui Li, Wentao Wang, Xiong Wang, Ming Zhang, Xue Chen:
Achieving IoT data security based blockchain. 2694-2707 - Yuyu Meng, Shah Nazir, Jing Guo, Irfan Uddin:
A decision support system for the uses of lightweight blockchain designs for P2P computing. 2708-2718 - Alberto Huertas Celdrán, Kallol Krishna Karmakar, Félix Gómez Mármol, Vijay Varadharajan:
Detecting and mitigating cyberattacks using software defined networks for integrated clinical environments. 2719-2734 - Heli Wang, Qiao Yan, Victor C. M. Leung:
The impact of propagation delay to different selfish miners in proof-of-work blockchains. 2735-2742 - Amr Tolba:
A two-level traffic smoothing method for efficient cloud-IoT communications. 2743-2756 - Dakshita Reebadiya, Tejal Rathod, Rajesh Gupta, Sudeep Tanwar, Neeraj Kumar:
Blockchain-based Secure and Intelligent Sensing Scheme for Autonomous Vehicles Activity Tracking Beyond 5G Networks. 2757-2774 - Debashis Das, Sourav Banerjee, Uttam Ghosh, Utpal Biswas, Ali Kashif Bashir:
A decentralized vehicle anti-theft system using Blockchain and smart contracts. 2775-2788 - Wei Liu, Yang Li, Xiujun Wang, Yufei Peng, Wei She, Zhao Tian:
A donation tracing blockchain model using improved DPoS consensus algorithm. 2789-2800 - Chenchen Li, Jiang Xiao, Xiaohai Dai, Hai Jin:
AMVchain: authority management mechanism on blockchain-based voting systems. 2801-2812 - S. Banupriya, Kottilingam Kottursamy, Ali Kashif Bashir:
Privacy-preserving hierarchical deterministic key generation based on a lattice of rings in public blockchain. 2813-2825 - Yuxi Li, Liang Qiao, Zhihan Lv:
An Optimized Byzantine Fault Tolerance Algorithm for Consortium Blockchain. 2826-2839 - Mahadev A. Gawas, Hemprasad Yashwant Patil, Sweta S. Govekar:
An integrative approach for secure data sharing in vehicular edge computing using Blockchain. 2840-2857 - Osamah Ibrahim Khalaf, Ghaida Muttashar Abdulsahib:
Optimized dynamic storage of data (ODSD) in IoT based on blockchain for wireless sensor networks. 2858-2873 - Wei-Yang Chiu, Weizhi Meng:
EdgeTC - a PBFT blockchain-based ETC scheme for smart cities. 2874-2886 - Huimin Li, Xinyao Chen, Zhiwei Guo, Jun-Li Xu, Yu Shen, Xu Gao:
Data-driven peer-to-peer blockchain framework for water consumption management. 2887-2900 - Shafaq Naheed Khan, Faiza Loukil, Chirine Ghedira Guégan, Elhadj Benkhelifa, Anoud Bani-Hani:
Blockchain smart contracts: Applications, challenges, and future trends. 2901-2925 - Anup Kumar Paul, Xin Qu, Zheng Wen:
Blockchain-a promising solution to internet of things: A comprehensive analysis, opportunities, challenges and future research issues. 2926-2951 - Guangxia Xu, Jingnan Dong, Chuang Ma:
A certificateless encryption scheme based on blockchain. 2952-2960 - Priyanka Kamboj, Shivang Khare, Sujata Pal:
User authentication using Blockchain based smart contract in role-based access control. 2961-2976 - Chien-Ming Chen, Zhuoyu Tie, Eric Ke Wang, Muhammad Khurram Khan, Sachin Kumar, Saru Kumari:
Verifiable dynamic ranked search with forward privacy over encrypted cloud data. 2977-2991 - Saeed Banaeian Far, Maryam Rajabzadeh Asaar:
A blockchain-based quantum-secure reporting protocol. 2992-3011 - Soumya Purohit, Prasad Calyam, Mauro Lemus Alarcon, Naga Ramya Bhamidipati, Abu Saleh Mohammad Mosa, Khaled Salah:
HonestChain: Consortium blockchain for protected data sharing in health information systems. 3012-3028 - Wei She, Lijuan Huo, Zhao Tian, Yan Zhuang, Chaoyi Niu, Wei Liu:
A double steganography model combining blockchain and interplanetary file system. 3029-3042 - Mehedi Masud, Gurjot Singh Gaba, Karanjeet Choudhary, Roobaea Alroobaea, M. Shamim Hossain:
A robust and lightweight secure access scheme for cloud based E-healthcare services. 3043-3057 - (Withdrawn) Secure access control for manufacturing sector with application of ethereum blockchain. 3058-3074
- Xuan Chen, Kien Nguyen, Hiroo Sekiya:
An experimental study on performance of private blockchain in IoT applications. 3075-3091 - Chukwuka Chukwuocha, Parimala Thulasiraman, Ruppa K. Thulasiram:
Trust and scalable blockchain-based message exchanging scheme on VANET. 3092-3109 - Shakeel Zafar, Zareen Alamgir, M. H. Rehman:
An effective blockchain evaluation system based on entropy-CRITIC weight method and MCDM techniques. 3110-3123 - Vibha Jain, Bijendra Kumar:
Combinatorial auction based multi-task resource allocation in fog environment using blockchain and smart contracts. 3124-3142 - Liqun Liu, Weihan Zhang, Cunqi Han:
A survey for the application of blockchain technology in the media. 3143-3165 - Anil Kumar Budati, George Ghinea, Dileep Kumar Yadav, Hafeez Basha Ranipet:
Guest editorial: Cognitive models for peer to peer networking in 5G and beyond networks and systems. 3166-3169 - Anh-Tu Le, Dinh-Thuan Do, Wen-Thong Chang, Chien-Thang Vu:
Cognitive IoT relaying NOMA networks with user clustering and imperfect SIC. 3170-3180 - Usman Rauf Kamboh, Ubaid Ullah, Shehzad Khalid, Umar Raza, Chinmay Chakraborty, Fadi Al-Turjman:
Path loss modelling at 60 GHz mmWave based on cognitive 3D ray tracing algorithm in 5G. 3181-3197 - Bhawna Chaudhary, Karan Singh:
A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks. 3198-3212 - Vivek Gupta, N. S. Beniwal, Krishna Kant Singh, Shivendra Nath Sharan, Akansha Singh:
Optimal cooperative spectrum sensing for 5G cognitive networks using evolutionary algorithms. 3213-3224 - Haythem Bany Salameh, Sarah Mahasneh, Ahmed Musa, Rami Halloush, Yaser Jararweh:
Effective peer-to-peer routing in heterogeneous half-duplex and full-duplex multi-hop cognitive radio networks. 3225-3234 - S. B. Goyal, Pradeep Bedi, Jugnesh Kumar, Varadarajan Vijayakumar:
Deep learning application for sensing available spectrum for cognitive radio: An ECRNN approach. 3235-3249 - Wali Ullah Khan, Xingwang Li, Asim Ihsan, Zain Ali, Basem M. ElHalawany, Guftaar Ahmed Sardar Sidhu:
Energy efficiency maximization for beyond 5G NOMA-enabled heterogeneous networks. 3250-3264 - Feng Lyu, Wenchao Xu, Quan Yuan, Katsuya Suto:
Space-air-ground integrated networks for future IoT: Architecture, management, service and performance. 3265-3267 - Yan Ouyang, Wei Liu, Qiang Yang, Xingliang Mao, Fangfang Li:
Trust based task offloading scheme in UAV-enhanced edge computing network. 3268-3290 - Ying Wan, Jun Long, Limin Liu, Zheman Qian, Siwei Zhong:
Downlink aware data scheduling with delay guarantees in resource-limited leo satellite networks. 3291-3306 - Ling Lyu, Zhenhang Chu, Bin Lin:
Joint association and power optimization for multi-UAV assisted cooperative transmission in marine IoT networks. 3307-3318 - Naijian Zhang, Qi Jiang, Long Li, Xindi Ma, Jianfeng Ma:
An efficient three-factor remote user authentication protocol based on BPV-FourQ for internet of drones. 3319-3332 - Xiaobin Xu, Hui Zhao, Chang Liu, Qi Wang, Shangguang Wang:
Resource management of GEO relays for real-time remote sensing. 3333-3348 - Xiaojuan Wei, Xu Han, Bichuan Zhu, Jinglin Li, Fangchun Yang:
A double-layer collaborative apportionment method for personalized and balanced routing. 3349-3359 - Xinru Mi, Chungang Yang, Yanbo Song, Ying Ouyang:
A distributed matching game for exploring resource allocation in satellite networks. 3360-3371 - Rongping Zheng, Jiaxiang Zhang, Qi Yang:
An ACO-based cross-layer routing algorithm in space-air-ground integrated networks. 3372-3387 - Junjie Zhou, Zhou Su, Qichao Xu, Weiwei Chen:
Cooperative content offloading scheme in air-ocean integrated networks. 3388-3404
Volume 14, Number 6, November 2021
- Mohammad Ammad Uddin, Muhammad Ayaz, Ali Mansour, El-Hadi M. Aggoune, Zubair Sharif, Imran Razzak:
Cloud-connected flying edge computing for smart agriculture. 3405-3415 - R. Hemalatha, R. Umamaheswari, S. Jothi:
Optimal route maintenance based on adaptive equilibrium optimization and GTA based route discovery model in MANET. 3416-3430 - Ting Li, Guosheng Huang, Shaobo Zhang, Zhiwen Zeng:
NTSC: a novel trust-based service computing scheme in social internet of things. 3431-3451 - Zhenfang Teng, Ledan Qian, Jianfei Huang:
Multi-target localization algorithm for wireless sensor network. 3452-3459 - Yepeng Deng, Fangfang Gou, Jia Wu:
Hybrid data transmission scheme based on source node centrality and community reconstruction in opportunistic social networks. 3460-3472 - Tao Wan, Luyao Wang, Weichuan Liao, Shixin Yue:
A lightweight continuous authentication scheme for medical wireless body area networks. 3473-3487 - Zhiqiang Zhang, Suzhen Cao, Xiaodong Yang, Xueyan Liu, Longbo Han:
An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments. 3488-3501 - S. Muruganandam, J. Arokia Renjit:
Real-time reliable clustering and secure transmission scheme for QoS development in MANET. 3502-3517 - Akshay Verma, Sunil Kumar, Prateek Raj Gautam, Arvind Kumar:
Neural-Fuzzy based effective clustering for large-scale wireless sensor networks with mobile sink. 3518-3539 - Amrendra Singh Yadav, Dharmender Singh Kushwaha:
Blockchain-based digitization of land record through trust value-based consensus algorithm. 3540-3558 - Saleh A. Alghamdi:
Stable zone-based 5G clustered MANET using interest-region-based routing and gateway selection. 3559-3577 - Huan Zhou, Zeshun Shi, Xue Ouyang, Zhiming Zhao:
Building a blockchain-based decentralized ecosystem for cloud and edge computing: an ALLSTAR approach and empirical study. 3578-3594 - Rossano Gaeta, Marco Grangetto:
On the robustness of three classes of rateless codes against pollution attacks in P2P networks. 3595-3604 - Weixing Chen, Jingfang Su, Chaochen Cui, Bin Chen:
Topology control routing strategy based on message forwarding in apron opportunistic networks. 3605-3618 - Prasanta Kumar Roy, Ansuman Bhattacharya:
Desynchronization resistant privacy preserving user authentication protocol for location based services. 3619-3633 - Ali Arjomandi-Nezhad, Mahmud Fotuhi-Firuzabad, Ali Dorri, Payman Dehghanian:
Proof of humanity: A tax-aware society-centric consensus algorithm for Blockchains. 3634-3646 - Chang Xu, Lan Yu, Liehuang Zhu, Can Zhang:
A blockchain-based dynamic searchable symmetric encryption scheme under multiple clouds. 3647-3659 - Ariel Orda, Ori Rottenstreich:
Enforcing Fairness in Blockchain Transaction Ordering. 3660-3673 - Hua Wu, Qiuyan Wu, Guang Cheng, Shuyi Guo, Xiaoyan Hu, Shen Yan:
SFIM: Identify user behavior based on stable features. 3674-3687 - Sreemana Datta, Ditipriya Sinha:
BESDDFFS: Blockchain and EdgeDrone based secured data delivery for forest fire surveillance. 3688-3717 - Jian Gong, Ju Ren, Yaoxue Zhang:
DeepNav: A scalable and plug-and-play indoor navigation system based on visual CNN. 3718-3736 - Mohd Shariq, Karan Singh, Pramod Kumar Maurya, Ali Ahmadian, Muhammad Rezal Kamel Ariffin:
URASP: An ultralightweight RFID authentication scheme using permutation operation. 3737-3757 - Hasib Mahmud, Tanzilur Rahman:
An Application of blockchain to securely acquire, diagnose and share clinical data through smartphone. 3758-3777 - Xingbing Zhao, Yu Zeng, Hongwei Ding, Bo Li, Zhijun Yang:
Optimize the placement of edge server between workload balancing and system delay in smart city. 3778-3792 - Zhong-Nan Zhao, Yanli Wang, Huiqiang Wang:
SDN-based cross-domain cooperative method for trusted nodes recommendation in Mobile crowd sensing. 3793-3805 - Dong Liang, Qinrang Liu, Binghao Yan, Yanbin Hu, Bo Zhao, Tao Hu:
Low interruption ratio link fault recovery scheme for data plane in software-defined networks. 3806-3819 - Balaji Coimbatore GaneshSankar, Krishnan Murugan:
Extending the coverage of evolved Node-B by relaying data using device-to-device offloading in next generation cellular network. 3820-3830 - Munir Majdalawieh, Nishara Nizamuddin, Maher Ala'raj, Shafaq Naheed Khan, Anoud Bani-Hani:
Blockchain-based solution for Secure and Transparent Food Supply Chain Network. 3831-3850 - Tripti Rathee, Parvinder Singh:
Secure data sharing using Merkle hash digest based blockchain identity management. 3851-3864 - Abbas Najafizadeh, Afshin Salajegheh, Amir Masoud Rahmani, Amir Sahafi:
Privacy-preserving for the internet of things in multi-objective task scheduling in cloud-fog computing using goal programming approach. 3865-3890 - Deze Zeng, Geyong Min, Qiang He, Song Guo:
Convergence of Edge Computing and Next Generation Networking. 3891-3894 - Liang Liu, Yiting Wang, Weizhi Meng, Zhe Xu, Wenzhao Gao, Zuchao Ma:
Towards efficient and energy-aware query processing for industrial internet of things. 3895-3914 - Xiaofei Cao, Sanjay Madria:
An efficient moving object tracking framework for WSNs using sequence-to-sequence learning model. 3915-3928 - Jiaqi Liu, Shiyue Huang, Wei Wang, Deng Li, Xiaoheng Deng:
An incentive mechanism based on endowment effect facing social welfare in Crowdsensing. 3929-3945 - Zhuo Li, Wentao Dong, Xin Chen:
Deep reinforcement learning-based incentive mechanism design for short video sharing through D2D communication. 3946-3958 - Dongdong Ren, Xiaocui Li, Zhangbing Zhou:
Energy-efficient sensory data gathering in IoT networks with mobile edge computing. 3959-3970 - Runhua Wang, Feng Zeng, Xiaoheng Deng, Jinsong Wu:
Joint computation offloading and resource allocation in vehicular edge computing based on an economic theory: walrasian equilibrium. 3971-3983 - Zhe Li, Honglong Chen, Kai Lin, Vladimir V. Shakhov, Leyi Shi, Jiguo Yu:
From edge data to recommendation: A double attention-based deformable convolutional network. 3984-3997 - Dapeng Wu, Haoyi Xu, Zhidu Li, Ruyan Wang:
Video placement and delivery in edge caching networks: Analytical model and optimization scheme. 3998-4013 - Meimei Zhang, Jun Luo, Liangjie Zhang, Xiquan Yu, Ting Xu, Kai Lei:
Comparative analysis of probabilistic forwarding strategies in ICN for edge computing. 4014-4030 - Lei Shi, Zhigang Xu, Yabo Sun, Yi Shi, Yuqi Fan, Xu Ding:
A DNN inference acceleration algorithm combining model partition and task allocation in heterogeneous edge computing system. 4031-4045
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.